Vulnerabilites related to hpe - hpux-ntp
CVE-2018-7170 (GCVE-0-2018-7170)
Vulnerability from cvelistv5
Published
2018-03-06 20:00
Modified
2024-08-05 06:24
Severity ?
CWE
  • n/a
Summary
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:24:10.327Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
          },
          {
            "name": "GLSA-201805-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201805-12"
          },
          {
            "name": "FreeBSD-SA-18:02",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
          },
          {
            "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/NtpBug3415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.synology.com/support/security/Synology_SA_18_13"
          },
          {
            "name": "103194",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103194"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim\u0027s clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-31T18:06:16",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
        },
        {
          "name": "GLSA-201805-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201805-12"
        },
        {
          "name": "FreeBSD-SA-18:02",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
        },
        {
          "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/NtpBug3415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.synology.com/support/security/Synology_SA_18_13"
        },
        {
          "name": "103194",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103194"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-7170",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim\u0027s clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
            },
            {
              "name": "GLSA-201805-12",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201805-12"
            },
            {
              "name": "FreeBSD-SA-18:02",
              "refsource": "FREEBSD",
              "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20180626-0001/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
            },
            {
              "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/NtpBug3415",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/NtpBug3415"
            },
            {
              "name": "https://www.synology.com/support/security/Synology_SA_18_13",
              "refsource": "CONFIRM",
              "url": "https://www.synology.com/support/security/Synology_SA_18_13"
            },
            {
              "name": "103194",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103194"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-7170",
    "datePublished": "2018-03-06T20:00:00",
    "dateReserved": "2018-02-15T00:00:00",
    "dateUpdated": "2024-08-05T06:24:10.327Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-7185 (GCVE-0-2018-7185)
Vulnerability from cvelistv5
Published
2018-03-06 20:00
Modified
2024-08-05 06:24
Severity ?
CWE
  • n/a
Summary
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:24:11.467Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
          },
          {
            "name": "GLSA-201805-12",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201805-12"
          },
          {
            "name": "FreeBSD-SA-18:02",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
          },
          {
            "name": "USN-3707-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3707-2/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
          },
          {
            "name": "103339",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103339"
          },
          {
            "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/NtpBug3454"
          },
          {
            "name": "USN-3707-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3707-1/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.synology.com/support/security/Synology_SA_18_13"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the \"other side\" of an interleaved association causing the victim ntpd to reset its association."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-31T18:06:27",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
        },
        {
          "name": "GLSA-201805-12",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201805-12"
        },
        {
          "name": "FreeBSD-SA-18:02",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
        },
        {
          "name": "USN-3707-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3707-2/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
        },
        {
          "name": "103339",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103339"
        },
        {
          "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/NtpBug3454"
        },
        {
          "name": "USN-3707-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3707-1/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.synology.com/support/security/Synology_SA_18_13"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-7185",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the \"other side\" of an interleaved association causing the victim ntpd to reset its association."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
            },
            {
              "name": "GLSA-201805-12",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201805-12"
            },
            {
              "name": "FreeBSD-SA-18:02",
              "refsource": "FREEBSD",
              "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
            },
            {
              "name": "USN-3707-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3707-2/"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20180626-0001/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
            },
            {
              "name": "103339",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103339"
            },
            {
              "name": "20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/NtpBug3454",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/NtpBug3454"
            },
            {
              "name": "USN-3707-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3707-1/"
            },
            {
              "name": "https://www.synology.com/support/security/Synology_SA_18_13",
              "refsource": "CONFIRM",
              "url": "https://www.synology.com/support/security/Synology_SA_18_13"
            },
            {
              "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
              "refsource": "MISC",
              "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-7185",
    "datePublished": "2018-03-06T20:00:00",
    "dateReserved": "2018-02-16T00:00:00",
    "dateUpdated": "2024-08-05T06:24:11.467Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-7434 (GCVE-0-2016-7434)
Vulnerability from cvelistv5
Published
2017-01-13 16:00
Modified
2024-08-06 01:57
Severity ?
CWE
  • n/a
Summary
The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:57:47.653Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
          },
          {
            "name": "94448",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94448"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/NtpBug3082"
          },
          {
            "name": "40806",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/40806/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://nwtime.org/ntp428p9_release/"
          },
          {
            "name": "VU#633847",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/633847"
          },
          {
            "name": "1037354",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037354"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa139"
          },
          {
            "name": "FreeBSD-SA-16:39",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-11-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-20T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
        },
        {
          "name": "94448",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94448"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/NtpBug3082"
        },
        {
          "name": "40806",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/40806/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://nwtime.org/ntp428p9_release/"
        },
        {
          "name": "VU#633847",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/633847"
        },
        {
          "name": "1037354",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037354"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bto.bluecoat.com/security-advisory/sa139"
        },
        {
          "name": "FreeBSD-SA-16:39",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-7434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
            },
            {
              "name": "94448",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94448"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/NtpBug3082",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/NtpBug3082"
            },
            {
              "name": "40806",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/40806/"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
            },
            {
              "name": "http://nwtime.org/ntp428p9_release/",
              "refsource": "CONFIRM",
              "url": "http://nwtime.org/ntp428p9_release/"
            },
            {
              "name": "VU#633847",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/633847"
            },
            {
              "name": "1037354",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037354"
            },
            {
              "name": "https://bto.bluecoat.com/security-advisory/sa139",
              "refsource": "CONFIRM",
              "url": "https://bto.bluecoat.com/security-advisory/sa139"
            },
            {
              "name": "FreeBSD-SA-16:39",
              "refsource": "FREEBSD",
              "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-7434",
    "datePublished": "2017-01-13T16:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T01:57:47.653Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-6458 (GCVE-0-2017-6458)
Vulnerability from cvelistv5
Published
2017-03-27 17:00
Modified
2024-08-05 15:33
Severity ?
CWE
  • n/a
Summary
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
References
http://www.securitytracker.com/id/1038123 vdb-entry, x_refsource_SECTRACK
http://support.ntp.org/bin/view/Main/NtpBug3379 x_refsource_CONFIRM
https://support.apple.com/HT208144 x_refsource_CONFIRM
http://www.securityfocus.com/bid/97051 vdb-entry, x_refsource_BID
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu x_refsource_CONFIRM
https://support.apple.com/kb/HT208144 x_refsource_CONFIRM
http://www.ubuntu.com/usn/USN-3349-1 vendor-advisory, x_refsource_UBUNTU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/ vendor-advisory, x_refsource_FEDORA
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/ x_refsource_CONFIRM
https://bto.bluecoat.com/security-advisory/sa147 x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2017/Nov/7 mailing-list, x_refsource_FULLDISC
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/ vendor-advisory, x_refsource_FEDORA
https://support.f5.com/csp/article/K99254031 x_refsource_CONFIRM
http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html x_refsource_MISC
http://seclists.org/fulldisclosure/2017/Sep/62 mailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/ vendor-advisory, x_refsource_FEDORA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us x_refsource_CONFIRM
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf x_refsource_CONFIRM
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 x_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:33:19.812Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1038123",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038123"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/NtpBug3379"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/HT208144"
          },
          {
            "name": "97051",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97051"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/kb/HT208144"
          },
          {
            "name": "USN-3349-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3349-1"
          },
          {
            "name": "FEDORA-2017-72323a442f",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa147"
          },
          {
            "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
          },
          {
            "name": "FEDORA-2017-20d54b2782",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K99254031"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
          },
          {
            "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
          },
          {
            "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
          },
          {
            "name": "FEDORA-2017-5ebac1c112",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-03-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-12T16:41:22",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1038123",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038123"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/NtpBug3379"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/HT208144"
        },
        {
          "name": "97051",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97051"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/kb/HT208144"
        },
        {
          "name": "USN-3349-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3349-1"
        },
        {
          "name": "FEDORA-2017-72323a442f",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bto.bluecoat.com/security-advisory/sa147"
        },
        {
          "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
        },
        {
          "name": "FEDORA-2017-20d54b2782",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K99254031"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
        },
        {
          "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
        },
        {
          "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
        },
        {
          "name": "FEDORA-2017-5ebac1c112",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-6458",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1038123",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038123"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/NtpBug3379",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/NtpBug3379"
            },
            {
              "name": "https://support.apple.com/HT208144",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/HT208144"
            },
            {
              "name": "97051",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97051"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu"
            },
            {
              "name": "https://support.apple.com/kb/HT208144",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/kb/HT208144"
            },
            {
              "name": "USN-3349-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3349-1"
            },
            {
              "name": "FEDORA-2017-72323a442f",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/"
            },
            {
              "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/",
              "refsource": "CONFIRM",
              "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/"
            },
            {
              "name": "https://bto.bluecoat.com/security-advisory/sa147",
              "refsource": "CONFIRM",
              "url": "https://bto.bluecoat.com/security-advisory/sa147"
            },
            {
              "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
            },
            {
              "name": "FEDORA-2017-20d54b2782",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
            },
            {
              "name": "https://support.f5.com/csp/article/K99254031",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K99254031"
            },
            {
              "name": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
            },
            {
              "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
            },
            {
              "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
            },
            {
              "name": "FEDORA-2017-5ebac1c112",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
            },
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-6458",
    "datePublished": "2017-03-27T17:00:00",
    "dateReserved": "2017-03-03T00:00:00",
    "dateUpdated": "2024-08-05T15:33:19.812Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-9042 (GCVE-0-2016-9042)
Vulnerability from cvelistv5
Published
2018-06-04 20:00
Modified
2024-09-17 03:53
CWE
  • denial of service
Summary
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
References
http://www.securitytracker.com/id/1038123 vdb-entry, x_refsource_SECTRACK
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc vendor-advisory, x_refsource_FREEBSD
http://www.securitytracker.com/id/1039427 vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/97046 vdb-entry, x_refsource_BID
http://www.ubuntu.com/usn/USN-3349-1 vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded mailing-list, x_refsource_BUGTRAQ
http://seclists.org/fulldisclosure/2017/Nov/7 mailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/540403/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/ vendor-advisory, x_refsource_FEDORA
http://seclists.org/fulldisclosure/2017/Sep/62 mailing-list, x_refsource_FULLDISC
http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded mailing-list, x_refsource_BUGTRAQ
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us x_refsource_CONFIRM
https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260 x_refsource_MISC
http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html x_refsource_MISC
https://kc.mcafee.com/corporate/index?page=content&id=SB10201 x_refsource_CONFIRM
https://support.apple.com/kb/HT208144 x_refsource_CONFIRM
https://support.f5.com/csp/article/K39041624 x_refsource_CONFIRM
https://bto.bluecoat.com/security-advisory/sa147 x_refsource_CONFIRM
http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html x_refsource_MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf x_refsource_CONFIRM
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 x_refsource_MISC
Impacted products
Vendor Product Version
Talos Network Time Protocol Version: NTP 4.2.8p9
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:42:09.927Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1038123",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038123"
          },
          {
            "name": "FreeBSD-SA-17:03",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc"
          },
          {
            "name": "1039427",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1039427"
          },
          {
            "name": "97046",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97046"
          },
          {
            "name": "USN-3349-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-3349-1"
          },
          {
            "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded"
          },
          {
            "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
          },
          {
            "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded"
          },
          {
            "name": "FEDORA-2017-20d54b2782",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
          },
          {
            "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
          },
          {
            "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/kb/HT208144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K39041624"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa147"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Network Time Protocol",
          "vendor": "Talos",
          "versions": [
            {
              "status": "affected",
              "version": "NTP 4.2.8p9"
            }
          ]
        }
      ],
      "datePublic": "2017-03-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T19:17:22",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "1038123",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038123"
        },
        {
          "name": "FreeBSD-SA-17:03",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc"
        },
        {
          "name": "1039427",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1039427"
        },
        {
          "name": "97046",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97046"
        },
        {
          "name": "USN-3349-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-3349-1"
        },
        {
          "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded"
        },
        {
          "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
        },
        {
          "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded"
        },
        {
          "name": "FEDORA-2017-20d54b2782",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
        },
        {
          "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
        },
        {
          "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/kb/HT208144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K39041624"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bto.bluecoat.com/security-advisory/sa147"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "DATE_PUBLIC": "2017-03-29T00:00:00",
          "ID": "CVE-2016-9042",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Network Time Protocol",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "NTP 4.2.8p9"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Talos"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": 3.7,
            "baseSeverity": "Low",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1038123",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038123"
            },
            {
              "name": "FreeBSD-SA-17:03",
              "refsource": "FREEBSD",
              "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc"
            },
            {
              "name": "1039427",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1039427"
            },
            {
              "name": "97046",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97046"
            },
            {
              "name": "USN-3349-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-3349-1"
            },
            {
              "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded"
            },
            {
              "name": "20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
            },
            {
              "name": "20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded"
            },
            {
              "name": "FEDORA-2017-20d54b2782",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
            },
            {
              "name": "20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
            },
            {
              "name": "20170422 [slackware-security] ntp (SSA:2017-112-02)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260"
            },
            {
              "name": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html"
            },
            {
              "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201",
              "refsource": "CONFIRM",
              "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201"
            },
            {
              "name": "https://support.apple.com/kb/HT208144",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/kb/HT208144"
            },
            {
              "name": "https://support.f5.com/csp/article/K39041624",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K39041624"
            },
            {
              "name": "https://bto.bluecoat.com/security-advisory/sa147",
              "refsource": "CONFIRM",
              "url": "https://bto.bluecoat.com/security-advisory/sa147"
            },
            {
              "name": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
            },
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2016-9042",
    "datePublished": "2018-06-04T20:00:00Z",
    "dateReserved": "2016-10-26T00:00:00",
    "dateUpdated": "2024-09-17T03:53:51.612Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8936 (GCVE-0-2019-8936)
Vulnerability from cvelistv5
Published
2019-05-15 15:37
Modified
2024-08-04 21:31
Severity ?
CWE
  • n/a
Summary
NTP through 4.2.8p12 has a NULL Pointer Dereference.
References
https://security.gentoo.org/glsa/201903-15 vendor-advisory, x_refsource_GENTOO
http://support.ntp.org/bin/view/Main/SecurityNotice x_refsource_MISC
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html vendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html vendor-advisory, x_refsource_SUSE
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/ vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/ vendor-advisory, x_refsource_FEDORA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/ vendor-advisory, x_refsource_FEDORA
https://security.netapp.com/advisory/ntap-20190503-0001/ x_refsource_CONFIRM
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc vendor-advisory, x_refsource_FREEBSD
https://seclists.org/bugtraq/2019/May/39 mailing-list, x_refsource_BUGTRAQ
http://bugs.ntp.org/show_bug.cgi?id=3565 x_refsource_CONFIRM
http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html x_refsource_MISC
https://support.f5.com/csp/article/K61363039 x_refsource_CONFIRM
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us x_refsource_CONFIRM
https://usn.ubuntu.com/4563-1/ vendor-advisory, x_refsource_UBUNTU
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:31:37.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201903-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201903-15"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/SecurityNotice"
          },
          {
            "name": "openSUSE-SU-2019:1143",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html"
          },
          {
            "name": "openSUSE-SU-2019:1158",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html"
          },
          {
            "name": "FEDORA-2019-b0c7f0d94a",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/"
          },
          {
            "name": "FEDORA-2019-694e3aa4e8",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/"
          },
          {
            "name": "FEDORA-2019-f781d5c4c6",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20190503-0001/"
          },
          {
            "name": "FreeBSD-SA-19:04",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc"
          },
          {
            "name": "20190515 FreeBSD Security Advisory FreeBSD-SA-19:04.ntp",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "https://seclists.org/bugtraq/2019/May/39"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.ntp.org/show_bug.cgi?id=3565"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K61363039"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
          },
          {
            "name": "USN-4563-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/4563-1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "NTP through 4.2.8p12 has a NULL Pointer Dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-10-07T15:06:12",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-201903-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201903-15"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://support.ntp.org/bin/view/Main/SecurityNotice"
        },
        {
          "name": "openSUSE-SU-2019:1143",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html"
        },
        {
          "name": "openSUSE-SU-2019:1158",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html"
        },
        {
          "name": "FEDORA-2019-b0c7f0d94a",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/"
        },
        {
          "name": "FEDORA-2019-694e3aa4e8",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/"
        },
        {
          "name": "FEDORA-2019-f781d5c4c6",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20190503-0001/"
        },
        {
          "name": "FreeBSD-SA-19:04",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc"
        },
        {
          "name": "20190515 FreeBSD Security Advisory FreeBSD-SA-19:04.ntp",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "https://seclists.org/bugtraq/2019/May/39"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.ntp.org/show_bug.cgi?id=3565"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K61363039"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
        },
        {
          "name": "USN-4563-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/4563-1/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-8936",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NTP through 4.2.8p12 has a NULL Pointer Dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201903-15",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201903-15"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/SecurityNotice",
              "refsource": "MISC",
              "url": "http://support.ntp.org/bin/view/Main/SecurityNotice"
            },
            {
              "name": "openSUSE-SU-2019:1143",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html"
            },
            {
              "name": "openSUSE-SU-2019:1158",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html"
            },
            {
              "name": "FEDORA-2019-b0c7f0d94a",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/"
            },
            {
              "name": "FEDORA-2019-694e3aa4e8",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/"
            },
            {
              "name": "FEDORA-2019-f781d5c4c6",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20190503-0001/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20190503-0001/"
            },
            {
              "name": "FreeBSD-SA-19:04",
              "refsource": "FREEBSD",
              "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc"
            },
            {
              "name": "20190515 FreeBSD Security Advisory FreeBSD-SA-19:04.ntp",
              "refsource": "BUGTRAQ",
              "url": "https://seclists.org/bugtraq/2019/May/39"
            },
            {
              "name": "http://bugs.ntp.org/show_bug.cgi?id=3565",
              "refsource": "CONFIRM",
              "url": "http://bugs.ntp.org/show_bug.cgi?id=3565"
            },
            {
              "name": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html"
            },
            {
              "name": "https://support.f5.com/csp/article/K61363039",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K61363039"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
            },
            {
              "name": "USN-4563-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/4563-1/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-8936",
    "datePublished": "2019-05-15T15:37:31",
    "dateReserved": "2019-02-19T00:00:00",
    "dateUpdated": "2024-08-04T21:31:37.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2016-7426 (GCVE-0-2016-7426)
Vulnerability from cvelistv5
Published
2017-01-13 16:00
Modified
2024-08-06 01:57
Severity ?
CWE
  • n/a
Summary
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:57:47.647Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
          },
          {
            "name": "USN-3707-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/3707-2/"
          },
          {
            "name": "RHSA-2017:0252",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://nwtime.org/ntp428p9_release/"
          },
          {
            "name": "VU#633847",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/633847"
          },
          {
            "name": "1037354",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037354"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bto.bluecoat.com/security-advisory/sa139"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/NtpBug3071"
          },
          {
            "name": "FreeBSD-SA-16:39",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
          },
          {
            "name": "94451",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94451"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-11-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-24T10:57:02",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
        },
        {
          "name": "USN-3707-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/3707-2/"
        },
        {
          "name": "RHSA-2017:0252",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://nwtime.org/ntp428p9_release/"
        },
        {
          "name": "VU#633847",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/633847"
        },
        {
          "name": "1037354",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037354"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bto.bluecoat.com/security-advisory/sa139"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/NtpBug3071"
        },
        {
          "name": "FreeBSD-SA-16:39",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
        },
        {
          "name": "94451",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94451"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-7426",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
            },
            {
              "name": "USN-3707-2",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/3707-2/"
            },
            {
              "name": "RHSA-2017:0252",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
            },
            {
              "name": "http://nwtime.org/ntp428p9_release/",
              "refsource": "CONFIRM",
              "url": "http://nwtime.org/ntp428p9_release/"
            },
            {
              "name": "VU#633847",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/633847"
            },
            {
              "name": "1037354",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037354"
            },
            {
              "name": "https://bto.bluecoat.com/security-advisory/sa139",
              "refsource": "CONFIRM",
              "url": "https://bto.bluecoat.com/security-advisory/sa139"
            },
            {
              "name": "http://support.ntp.org/bin/view/Main/NtpBug3071",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/NtpBug3071"
            },
            {
              "name": "FreeBSD-SA-16:39",
              "refsource": "FREEBSD",
              "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
            },
            {
              "name": "94451",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94451"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-7426",
    "datePublished": "2017-01-13T16:00:00",
    "dateReserved": "2016-09-09T00:00:00",
    "dateUpdated": "2024-08-06T01:57:47.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-05-15 16:29
Modified
2024-11-21 04:50
Summary
NTP through 4.2.8p12 has a NULL Pointer Dereference.
References
cve@mitre.orghttp://bugs.ntp.org/show_bug.cgi?id=3565Exploit, Issue Tracking, Vendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://support.ntp.org/bin/view/Main/SecurityNoticeRelease Notes, Vendor Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/
cve@mitre.orghttps://seclists.org/bugtraq/2019/May/39Issue Tracking, Mailing List, Third Party Advisory
cve@mitre.orghttps://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.ascMitigation, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201903-15Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20190503-0001/Patch, Third Party Advisory
cve@mitre.orghttps://support.f5.com/csp/article/K61363039Third Party Advisory
cve@mitre.orghttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/4563-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.ntp.org/show_bug.cgi?id=3565Exploit, Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/SecurityNoticeRelease Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/May/39Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.ascMitigation, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201903-15Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190503-0001/Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K61363039Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4563-1/
Impacted products
Vendor Product Version
netapp clustered_data_ontap *
netapp data_ontap -
fedoraproject fedora 28
fedoraproject fedora 29
fedoraproject fedora 30
opensuse leap 15.0
opensuse leap 42.3
hpe hpux-ntp *
ntp ntp *
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C68F28EC-4283-4A8D-83CD-E69B2A85B0C4",
              "versionEndExcluding": "9.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*",
              "matchCriteriaId": "392A1364-2739-450D-9E19-DFF93081C2C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB",
              "versionEndExcluding": "c.4.2.8.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED3C1F7-6FFA-44D1-BC56-2BB1963F3B9F",
              "versionEndExcluding": "4.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
              "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
              "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
              "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*",
              "matchCriteriaId": "0BC62D4E-D519-458C-BE4E-10DDB73A97D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p11:*:*:*:*:*:*",
              "matchCriteriaId": "1C420117-862A-41A9-BAE8-8B3478FAEBC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p12:*:*:*:*:*:*",
              "matchCriteriaId": "4A484251-3220-498C-83FE-A04B013A31A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
              "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
              "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
              "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
              "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*",
              "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*",
              "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*",
              "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NTP through 4.2.8p12 has a NULL Pointer Dereference."
    },
    {
      "lang": "es",
      "value": "NTP hasta 4.2.8p12 tiene una desreferencia del puntero NULL."
    }
  ],
  "id": "CVE-2019-8936",
  "lastModified": "2024-11-21T04:50:41.733",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-15T16:29:01.223",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://bugs.ntp.org/show_bug.cgi?id=3565"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/May/39"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201903-15"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20190503-0001/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K61363039"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/4563-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://bugs.ntp.org/show_bug.cgi?id=3565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/May/39"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201903-15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20190503-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.f5.com/csp/article/K61363039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/4563-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-01-13 16:59
Modified
2025-04-20 01:37
Summary
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
References
cve@mitre.orghttp://nwtime.org/ntp428p9_release/Third Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0252.htmlThird Party Advisory
cve@mitre.orghttp://support.ntp.org/bin/view/Main/NtpBug3071Issue Tracking, Mitigation, Vendor Advisory
cve@mitre.orghttp://support.ntp.org/bin/view/Main/SecurityNotice#Recent_VulnerabilitiesRelease Notes, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/94451Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1037354Third Party Advisory, VDB Entry
cve@mitre.orghttps://bto.bluecoat.com/security-advisory/sa139Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_usThird Party Advisory
cve@mitre.orghttps://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.ascThird Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/3707-2/Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/633847Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://nwtime.org/ntp428p9_release/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0252.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/NtpBug3071Issue Tracking, Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_VulnerabilitiesRelease Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94451Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037354Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa139Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3707-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/633847Third Party Advisory, US Government Resource
Impacted products
Vendor Product Version
ntp ntp *
ntp ntp *
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.5
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
canonical ubuntu_linux 12.04
redhat enterprise_linux_desktop 6.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_server 6.0
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 7.3
redhat enterprise_linux_server_aus 7.4
redhat enterprise_linux_server_aus 7.6
redhat enterprise_linux_server_aus 7.7
redhat enterprise_linux_server_eus 7.3
redhat enterprise_linux_server_eus 7.4
redhat enterprise_linux_server_eus 7.5
redhat enterprise_linux_server_eus 7.6
redhat enterprise_linux_server_eus 7.7
redhat enterprise_linux_server_tus 7.3
redhat enterprise_linux_server_tus 7.6
redhat enterprise_linux_server_tus 7.7
redhat enterprise_linux_workstation 6.0
redhat enterprise_linux_workstation 7.0
hpe hpux-ntp *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9B114E-15BF-4731-9296-A8F82591B418",
              "versionEndExcluding": "4.2.8",
              "versionStartIncluding": "4.2.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3505DE7A-B365-4455-A7BC-474019426C46",
              "versionEndExcluding": "4.3.94",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*",
              "matchCriteriaId": "EA207F59-B630-4BBB-9CD7-BA7B64581907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*",
              "matchCriteriaId": "06AE2082-B219-4E94-89E8-E1328224C9D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*",
              "matchCriteriaId": "6E0F5656-3E41-4568-A810-F2CFA3677488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*",
              "matchCriteriaId": "934152EB-5F5A-4BD8-B832-3B342551F9AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*",
              "matchCriteriaId": "6936BEB5-B765-45C5-B671-A9D0CC4988C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*",
              "matchCriteriaId": "BAA1E4CD-45EE-4814-AC6B-DE786C5B3B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*",
              "matchCriteriaId": "95779DD0-C768-4B1C-A720-23BE19606B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*",
              "matchCriteriaId": "1B035472-2B64-4BE4-8D25-6E31937641E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*",
              "matchCriteriaId": "3CE88876-F0BB-43A1-9A4A-91C5D6FFC02B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*",
              "matchCriteriaId": "4E4BE466-B479-47BA-9A1F-F0184E252103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*",
              "matchCriteriaId": "4E6D7F8F-EF71-44E6-B33F-E0265266C616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*",
              "matchCriteriaId": "AC47FB1E-289A-4AA1-9DF1-0CEE13C9335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*",
              "matchCriteriaId": "B7BC8DB4-E715-44F1-8759-0414613C9F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*",
              "matchCriteriaId": "5AF5BC27-EE65-4FB4-975E-FA3933B3202C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*",
              "matchCriteriaId": "795D50A9-41E5-40CE-88E9-391229607301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*",
              "matchCriteriaId": "1DE4338B-F5B3-4410-886D-0F28A7ECE824",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*",
              "matchCriteriaId": "B1463DC6-D0C7-46E6-8418-B7900C99D079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*",
              "matchCriteriaId": "C5B7AA5B-2BD5-4F19-A8BB-DF4677995602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*",
              "matchCriteriaId": "DBCF724B-5018-4794-97D9-D8EDC2F04060",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*",
              "matchCriteriaId": "2A62EAF1-3D51-456F-BBE3-A2E8CBE7960D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*",
              "matchCriteriaId": "67D86D6C-A8A3-4CD4-B1A5-57941B51C732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*",
              "matchCriteriaId": "E793243F-4179-46C9-B422-DC3D6E688B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*",
              "matchCriteriaId": "6EAC9B6E-3A88-4DED-A5D4-862E076620BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*",
              "matchCriteriaId": "AD8E8B74-6E16-47FF-A019-54B0438A8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*",
              "matchCriteriaId": "3C210EFA-7BF2-4EEE-B59C-F3C75743E182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*",
              "matchCriteriaId": "23A9CDE2-4520-4542-93B0-74A01E919597",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*",
              "matchCriteriaId": "94A7790A-DACE-4F02-B2FF-2C851EFD9717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*",
              "matchCriteriaId": "5ED47A47-3CB2-45CC-8147-CFFE0B93D966",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4FC2172C-73BD-441D-9963-5C9E89FB68F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "485C8744-A185-46EB-B27F-8A42ED76964B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C01153E2-A4E3-4EF9-A33E-1026F578CB44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "505CE414-C5E5-4251-9F02-A8A0DA6C0E91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "607E83FB-FDB7-49CA-9DA9-B8DA43C3DF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "864BA14B-B357-4ADD-BCE1-B2EAE4D299FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "2856AAB8-172F-4657-85FF-9FFB698C4457",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7C2B8290-8AD6-4EDD-9736-730DD33CA73A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A509FC81-ABFD-4CE1-ABD6-C47ECCF97892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7111A1FB-142C-4538-BC96-F71AEDC0FB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FB54C36C-F07A-4F99-A093-8EF10689E1C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CD57B6E4-9947-4790-BCAF-30B37C7CB837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "232170D9-923D-4DA5-9A7D-6A5BDCD37165",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A0BE1B30-DB6E-4029-8212-035449CEE22F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3181F3BF-8704-4D54-ABC4-CB68C89AF52D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E61A5F5E-8DCC-4809-A2DE-E39C8E01976F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1D2E80CD-0EAA-423B-B885-EDC5BFE962BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "11F45456-692B-415D-BDBF-BA639AA622BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FCEF3E6A-48C3-4A00-B286-58E642DE5928",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8CE352E5-DFFC-4580-9D5E-95EE7A5C2BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
              "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
              "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
              "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
              "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
              "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
              "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
              "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*",
              "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*",
              "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "21690BAC-2129-4A33-9B48-1F3BF30072A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C771C48E-2B29-491D-8FF0-69D81229465D",
              "versionEndExcluding": "c.4.2.8.2.0",
              "versionStartIncluding": "b.11.31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address."
    },
    {
      "lang": "es",
      "value": "NTP en versiones anteriores a 4.2.8p9 limita la clasificaci\u00f3n de respuestas recibidas desde las fuentes configuradas cuando la limitaci\u00f3n de clasificaci\u00f3n para todas las asociaciones est\u00e1 habilitado, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (prevenir las respuestas de las fuentes) enviando respuestas con una direcci\u00f3n de origen suplantada."
    }
  ],
  "id": "CVE-2016-7426",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-13T16:59:00.323",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://nwtime.org/ntp428p9_release/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3071"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94451"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037354"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa139"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3707-2/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/633847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://nwtime.org/ntp428p9_release/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0252.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037354"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3707-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/633847"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-06 20:29
Modified
2025-01-14 19:29
Summary
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
References
cve@mitre.orghttp://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://support.ntp.org/bin/view/Main/NtpBug3415Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/541824/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/103194Third Party Advisory, VDB Entry
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1550214Issue Tracking, Third Party Advisory
cve@mitre.orghttps://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.ascThird Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201805-12Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20180626-0001/Third Party Advisory
cve@mitre.orghttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
cve@mitre.orghttps://www.synology.com/support/security/Synology_SA_18_13Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/NtpBug3415Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/541824/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/103194Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1550214Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201805-12Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20180626-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/support/security/Synology_SA_18_13Third Party Advisory
Impacted products
Vendor Product Version
ntp ntp *
ntp ntp *
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
synology router_manager *
synology skynas *
synology virtual_diskstation_manager *
synology diskstation_manager *
synology vs960hd_firmware *
synology vs960hd -
netapp hci -
netapp solidfire -
hpe hpux-ntp *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C240BAAB-8C12-4501-9DC6-FB877304E908",
              "versionEndExcluding": "4.2.8",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A5D4FE7-07FC-4869-84F2-4FA767490A73",
              "versionEndExcluding": "4.3.92",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
              "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
              "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
              "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
              "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
              "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
              "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
              "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B0AEDA-4FC3-4AD8-ADE3-356A4498AF95",
              "versionEndExcluding": "1.1.6-6931-3",
              "versionStartIncluding": "1.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:skynas:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C114627A-7D1E-4B0C-B004-9CFAC78F2F0F",
              "versionEndExcluding": "6.1.5-15254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:virtual_diskstation_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65C1F9D-C457-49E8-A46B-9B15D5FCE5C7",
              "versionEndExcluding": "6.1.6-15266",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B270650E-B819-4CE6-B129-BF90CE8B2A03",
              "versionEndExcluding": "6.1.6-15266",
              "versionStartIncluding": "5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A606357-7469-43AD-8B5A-152C43D017DF",
              "versionEndExcluding": "2.2.3-1505",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB",
              "versionEndExcluding": "c.4.2.8.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim\u0027s clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549."
    },
    {
      "lang": "es",
      "value": "ntpd en ntp, en versiones 4.2.x anteriores a la 4.2.8p7 y versiones 4.3.x anteriores a la 4.3.92, permite que usuarios autenticados que conozcan la clave privada sim\u00e9trica creen de forma arbitraria muchas asociaciones ef\u00edmeras para ganar la selecci\u00f3n de reloj de ntpd y modifiquen el reloj de una v\u00edctima mediante un ataque Sybil. Este problema existe debido a una soluci\u00f3n incompleta para CVE-2016-1549."
    }
  ],
  "id": "CVE-2018-7170",
  "lastModified": "2025-01-14T19:29:55.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-06T20:29:01.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3415"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103194"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_18_13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_18_13"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-06-04 20:29
Modified
2024-11-21 03:00
Summary
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
References
talos-cna@cisco.comhttp://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html
talos-cna@cisco.comhttp://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
talos-cna@cisco.comhttp://seclists.org/fulldisclosure/2017/Nov/7
talos-cna@cisco.comhttp://seclists.org/fulldisclosure/2017/Sep/62
talos-cna@cisco.comhttp://www.securityfocus.com/archive/1/540403/100/0/threaded
talos-cna@cisco.comhttp://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded
talos-cna@cisco.comhttp://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
talos-cna@cisco.comhttp://www.securityfocus.com/bid/97046Permissions Required, Third Party Advisory, VDB Entry
talos-cna@cisco.comhttp://www.securitytracker.com/id/1038123Third Party Advisory, VDB Entry
talos-cna@cisco.comhttp://www.securitytracker.com/id/1039427Third Party Advisory, VDB Entry
talos-cna@cisco.comhttp://www.ubuntu.com/usn/USN-3349-1
talos-cna@cisco.comhttps://bto.bluecoat.com/security-advisory/sa147
talos-cna@cisco.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdfThird Party Advisory
talos-cna@cisco.comhttps://kc.mcafee.com/corporate/index?page=content&id=SB10201
talos-cna@cisco.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
talos-cna@cisco.comhttps://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.ascThird Party Advisory
talos-cna@cisco.comhttps://support.apple.com/kb/HT208144
talos-cna@cisco.comhttps://support.f5.com/csp/article/K39041624
talos-cna@cisco.comhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
talos-cna@cisco.comhttps://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
talos-cna@cisco.comhttps://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260Exploit, Mitigation, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2017/Nov/7
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2017/Sep/62
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/540403/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/97046Permissions Required, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038123Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1039427Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3349-1
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa147
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kc.mcafee.com/corporate/index?page=content&id=SB10201
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/kb/HT208144
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K39041624
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
af854a3a-2127-422b-91ae-364da2661108https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260Exploit, Mitigation, Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*",
              "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA79CE41-D873-4A4A-A20C-83EB8772E5FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E56F4F-B418-44DD-9C97-7276A4C58F3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB",
              "versionEndExcluding": "c.4.2.8.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EFD09A-3D77-47B0-93FB-50F6C13A2F9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F488810-73E3-4475-975A-C2FCA037E78B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad explotable de denegaci\u00f3n de servicio (DoS) en la funcionalidad de comprobaci\u00f3n de marca de tiempo de origen de ntpd 4.2.8p9. Se puede emplear un paquete de red no autenticado especialmente manipulado para reiniciar la marca de tiempo de origen esperada para los peers objetivo. Las respuestas leg\u00edtimas de los peers objetivo no pasar\u00e1n la comprobaci\u00f3n de marca de tiempo de origen (TEST2), lo que hace que la respuesta se elimine y se cree una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
    }
  ],
  "id": "CVE-2016-9042",
  "lastModified": "2024-11-21T03:00:29.693",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "talos-cna@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-06-04T20:29:00.417",
  "references": [
    {
      "source": "talos-cna@cisco.com",
      "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97046"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038123"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1039427"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "http://www.ubuntu.com/usn/USN-3349-1"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "https://bto.bluecoat.com/security-advisory/sa147"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "https://support.apple.com/kb/HT208144"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "https://support.f5.com/csp/article/K39041624"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "talos-cna@cisco.com",
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/540403/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1039427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-3349-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bto.bluecoat.com/security-advisory/sa147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10201"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.apple.com/kb/HT208144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K39041624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260"
    }
  ],
  "sourceIdentifier": "talos-cna@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-01-13 16:59
Modified
2025-04-20 01:37
Summary
The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
References
cve@mitre.orghttp://nwtime.org/ntp428p9_release/Third Party Advisory
cve@mitre.orghttp://support.ntp.org/bin/view/Main/NtpBug3082Issue Tracking, Mitigation, Vendor Advisory
cve@mitre.orghttp://support.ntp.org/bin/view/Main/SecurityNotice#Recent_VulnerabilitiesRelease Notes, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/94448Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1037354Third Party Advisory, VDB Entry
cve@mitre.orghttps://bto.bluecoat.com/security-advisory/sa139Third Party Advisory
cve@mitre.orghttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_usThird Party Advisory
cve@mitre.orghttps://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.ascThird Party Advisory
cve@mitre.orghttps://www.exploit-db.com/exploits/40806/Exploit, Third Party Advisory, VDB Entry
cve@mitre.orghttps://www.kb.cert.org/vuls/id/633847Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://nwtime.org/ntp428p9_release/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/NtpBug3082Issue Tracking, Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_VulnerabilitiesRelease Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94448Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037354Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa139Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/40806/Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/633847Third Party Advisory, US Government Resource
Impacted products
Vendor Product Version
ntp ntp *
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.7
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
hpe hpux-ntp *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3505DE7A-B365-4455-A7BC-474019426C46",
              "versionEndExcluding": "4.3.94",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p100:*:*:*:*:*:*",
              "matchCriteriaId": "18088A3E-C30F-4133-9D1A-B39181513EF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p101:*:*:*:*:*:*",
              "matchCriteriaId": "52B6CFF0-2C07-4706-A3B1-618015F52D6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p102:*:*:*:*:*:*",
              "matchCriteriaId": "90BF6D6B-DB23-4E50-A7D3-81B5F1CC5572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p103:*:*:*:*:*:*",
              "matchCriteriaId": "E79B84AA-FB11-453D-8216-CF25FBF15544",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p104:*:*:*:*:*:*",
              "matchCriteriaId": "EB264FC5-0D41-48F8-802D-5C1710A5B4D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p105:*:*:*:*:*:*",
              "matchCriteriaId": "81AB3169-0D14-46D3-9EBB-2835198EB94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p106:*:*:*:*:*:*",
              "matchCriteriaId": "D09EEB13-4F4A-4EF2-9F80-66D0E0E54FDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p107:*:*:*:*:*:*",
              "matchCriteriaId": "7776F628-D8B9-4691-849D-4B483740CAA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p108:*:*:*:*:*:*",
              "matchCriteriaId": "8C83234B-7CB1-46DE-AAA3-81D457C6BE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p109:*:*:*:*:*:*",
              "matchCriteriaId": "0EA68A07-98D5-4025-AA23-E32F8CD71769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p110:*:*:*:*:*:*",
              "matchCriteriaId": "880AABF9-B93D-468A-8C4B-9D3760DEE6C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p111:*:*:*:*:*:*",
              "matchCriteriaId": "40680475-27E0-41B9-9C52-E6498A36EBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p112:*:*:*:*:*:*",
              "matchCriteriaId": "6D871458-BC51-43BB-BD35-9DE945A6B772",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p113:*:*:*:*:*:*",
              "matchCriteriaId": "1EEE464F-6634-4214-B423-641AB29856AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p114:*:*:*:*:*:*",
              "matchCriteriaId": "49407030-4250-4DDD-B51A-794ED2AF8C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p115:*:*:*:*:*:*",
              "matchCriteriaId": "F43B2F0B-901F-4465-A736-5CC1CDDE3E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p116:*:*:*:*:*:*",
              "matchCriteriaId": "31BEC66A-6C37-407B-BBF5-35AC0FF7EC74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p117:*:*:*:*:*:*",
              "matchCriteriaId": "51A56AD7-B69A-4326-9889-BF90AB22F384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p118:*:*:*:*:*:*",
              "matchCriteriaId": "A145C1A2-FB8E-49A2-B1CF-D5FB43EA1525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p119:*:*:*:*:*:*",
              "matchCriteriaId": "68372642-A1A1-4723-9648-F60CBF77EF50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p120:*:*:*:*:*:*",
              "matchCriteriaId": "1A6C505D-3AB5-42F6-9902-C5668E28ADB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p121:*:*:*:*:*:*",
              "matchCriteriaId": "CE27B2F8-4F46-4DDE-920F-3EB1967A53BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p122:*:*:*:*:*:*",
              "matchCriteriaId": "58915E9F-AA40-46CF-B137-6BCF8798733A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p123:*:*:*:*:*:*",
              "matchCriteriaId": "EB4512B9-33AA-4B43-9579-C583F90581C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p124:*:*:*:*:*:*",
              "matchCriteriaId": "88725E06-49C9-45B4-9ECA-06B8B3EB5A37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p125:*:*:*:*:*:*",
              "matchCriteriaId": "72126656-2722-44F4-B01C-BEC19103C0F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p126:*:*:*:*:*:*",
              "matchCriteriaId": "37503B24-23B0-4871-89AC-839F60A5EACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p127:*:*:*:*:*:*",
              "matchCriteriaId": "83A7A62B-3189-43E7-897B-8DD9B98E6914",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p128:*:*:*:*:*:*",
              "matchCriteriaId": "95471C0C-0F04-4EE7-92A5-83AB955138DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p129:*:*:*:*:*:*",
              "matchCriteriaId": "F1FA55A0-66F8-49AB-8707-C7E4A070E5A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p130:*:*:*:*:*:*",
              "matchCriteriaId": "0000B855-4012-44DA-BF40-4F59A2476FB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p131:*:*:*:*:*:*",
              "matchCriteriaId": "EA3F0379-E0AB-429C-A1D1-8D10D96DE3D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p132:*:*:*:*:*:*",
              "matchCriteriaId": "CB716665-7EB8-4E22-9F38-19329F0DD7B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p133:*:*:*:*:*:*",
              "matchCriteriaId": "E31C1F62-9AB3-4D4D-939D-EE21B7196A94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p134:*:*:*:*:*:*",
              "matchCriteriaId": "5CD11265-AD38-4473-9609-194BC9F67C64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p135:*:*:*:*:*:*",
              "matchCriteriaId": "14CE2B31-8E10-40B5-88C6-D9807CA47B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p136:*:*:*:*:*:*",
              "matchCriteriaId": "99F04650-84E0-48A9-A351-B465736D5D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p137:*:*:*:*:*:*",
              "matchCriteriaId": "814A5DC9-6B9D-4813-A55F-0D81C7B5B992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p138:*:*:*:*:*:*",
              "matchCriteriaId": "012727A7-261B-4F63-AB65-9DE07CE4B5A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p139:*:*:*:*:*:*",
              "matchCriteriaId": "E724003A-14AE-445C-995B-D135EFA01FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p140:*:*:*:*:*:*",
              "matchCriteriaId": "44B0664F-3B93-444E-9D5B-6A8D8DA997E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p141:*:*:*:*:*:*",
              "matchCriteriaId": "56324E0F-41B5-4F78-8559-C008BF41D6F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p142:*:*:*:*:*:*",
              "matchCriteriaId": "20512BFF-402E-40C5-8A44-51BD43216FE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p143:*:*:*:*:*:*",
              "matchCriteriaId": "34FE8F13-56E9-4AA0-974A-B24EC585015E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p144:*:*:*:*:*:*",
              "matchCriteriaId": "D09C706D-0A89-4A6F-9EAE-63725B71CB79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p145:*:*:*:*:*:*",
              "matchCriteriaId": "99F276D8-6B10-46C7-8673-B53001865DE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p146:*:*:*:*:*:*",
              "matchCriteriaId": "E3FC1D17-6238-4299-99CC-22676FE4A950",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p147:*:*:*:*:*:*",
              "matchCriteriaId": "695C6140-B842-4DFF-B362-B4378EEBB7DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p148:*:*:*:*:*:*",
              "matchCriteriaId": "2EF5BC29-E0EE-4BE2-9054-0CB7A98620B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p149:*:*:*:*:*:*",
              "matchCriteriaId": "2FE15E41-3CF0-48B0-A919-361AD8A12500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p150:*:*:*:*:*:*",
              "matchCriteriaId": "F05BDA31-209D-492D-B48B-6456D2DC6D60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p151:*:*:*:*:*:*",
              "matchCriteriaId": "1CF90708-FF1C-4F6B-B5EC-07D508D9A7B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p152:*:*:*:*:*:*",
              "matchCriteriaId": "4543D8D1-4572-4867-B90E-4CB674A9682C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p153:*:*:*:*:*:*",
              "matchCriteriaId": "5BF0B3DD-DE8D-4EA6-B83B-BAE7F41B36FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p154:*:*:*:*:*:*",
              "matchCriteriaId": "E8429C6A-5191-4F31-B073-8471D15BDABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p155:*:*:*:*:*:*",
              "matchCriteriaId": "C452E6AE-87FE-489C-A397-1B50243AEB6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p156:*:*:*:*:*:*",
              "matchCriteriaId": "835FCE24-A3D8-4E44-9D62-AF5DB95BE003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p157:*:*:*:*:*:*",
              "matchCriteriaId": "4CFAC891-2709-480C-B6E3-D19F31EF7C77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p158:*:*:*:*:*:*",
              "matchCriteriaId": "015BD2A6-0352-490E-8E8D-2CEC6BBA5728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p159:*:*:*:*:*:*",
              "matchCriteriaId": "18DAFA1F-4434-47C8-8F84-97CE83BBD1CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p160:*:*:*:*:*:*",
              "matchCriteriaId": "715A4D93-2953-4682-9384-740A71CAE9D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p161:*:*:*:*:*:*",
              "matchCriteriaId": "6FD41C7B-253A-4171-82CA-50BA017C14A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p162:*:*:*:*:*:*",
              "matchCriteriaId": "13D73E63-D350-416C-818A-36B8F113D82C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p163:*:*:*:*:*:*",
              "matchCriteriaId": "301E509C-0DB3-4358-B6F7-AD133CE35F01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p164:*:*:*:*:*:*",
              "matchCriteriaId": "7E5E396E-BA00-4C12-939E-28F39BFBE756",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p165:*:*:*:*:*:*",
              "matchCriteriaId": "F70DFABC-ECD4-4672-8822-C2370AE4BBD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p166:*:*:*:*:*:*",
              "matchCriteriaId": "3180ABA9-D556-4E89-AEF8-0E0BA05328AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p170:*:*:*:*:*:*",
              "matchCriteriaId": "A6C5461F-5BBF-47D1-8917-7A5B6A08C2EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p171:*:*:*:*:*:*",
              "matchCriteriaId": "8A038A59-12A6-44B1-BF28-4AC9F33B8B2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p172:*:*:*:*:*:*",
              "matchCriteriaId": "50FF8A7D-DA4B-4CA3-9E18-ECA2487127D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p173:*:*:*:*:*:*",
              "matchCriteriaId": "C897B169-0E8C-4624-A595-C016951169C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p174:*:*:*:*:*:*",
              "matchCriteriaId": "A358B329-E131-42AA-95D3-015BDB32D0A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p175:*:*:*:*:*:*",
              "matchCriteriaId": "05B2C090-7AEF-42A0-B6C2-173A8C44FE8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p176:*:*:*:*:*:*",
              "matchCriteriaId": "817EDB3E-9529-436A-895E-A700E99B75C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p177:*:*:*:*:*:*",
              "matchCriteriaId": "69C74989-1186-4780-AB7C-7393CB87DA9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p178:*:*:*:*:*:*",
              "matchCriteriaId": "EBA41032-724C-4198-BEE5-8F8E10542718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p179:*:*:*:*:*:*",
              "matchCriteriaId": "FE00CC76-4174-481B-BE11-017E138D926C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p180:*:*:*:*:*:*",
              "matchCriteriaId": "90357BE1-5BED-4529-B266-01734337DD2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p181:*:*:*:*:*:*",
              "matchCriteriaId": "5F19B70E-C4D6-47A2-A784-7AFC8FD7A0EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p182:*:*:*:*:*:*",
              "matchCriteriaId": "370DF27C-5170-4E83-8C5F-2B71BB18DD2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p183:*:*:*:*:*:*",
              "matchCriteriaId": "24875D76-1F1D-409D-97AF-05C3EBABB6C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p184:*:*:*:*:*:*",
              "matchCriteriaId": "63A68652-A900-4ACA-88B1-2480481DCA3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p185:*:*:*:*:*:*",
              "matchCriteriaId": "8F93CAA7-43CF-4E77-948C-3B7ACB2065B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p186:*:*:*:*:*:*",
              "matchCriteriaId": "42AA7252-63A8-46D9-889F-82E2EB395B9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p187:*:*:*:*:*:*",
              "matchCriteriaId": "834B2001-0245-4229-924D-E2B663E799AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p188:*:*:*:*:*:*",
              "matchCriteriaId": "00DC5545-B625-4BA4-B9B3-86FA53F28078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p189:*:*:*:*:*:*",
              "matchCriteriaId": "8AE16E47-74E8-4228-9A7B-9C57B85D185C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p190:*:*:*:*:*:*",
              "matchCriteriaId": "B6CA6F5F-F42B-4ABF-AEE1-47078EE6FA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p191:*:*:*:*:*:*",
              "matchCriteriaId": "E306D867-323D-4459-9879-B187177E04A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p192:*:*:*:*:*:*",
              "matchCriteriaId": "BE01F660-1B93-44AB-A8B0-8952AEFBCC62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p193:*:*:*:*:*:*",
              "matchCriteriaId": "50929DCE-F805-4998-89FC-E7F058516A6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p194:*:*:*:*:*:*",
              "matchCriteriaId": "EC66E5EA-30CB-4305-ADD9-DDF487D33303",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p195:*:*:*:*:*:*",
              "matchCriteriaId": "ACCF3643-A5B9-4189-B7BA-E64DE95E66F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p196:*:*:*:*:*:*",
              "matchCriteriaId": "AF578C5C-F8C0-4634-A6D7-44C754F49160",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p197:*:*:*:*:*:*",
              "matchCriteriaId": "FCDAD4BA-937F-48FB-969A-5DAE6DE50E9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p198:*:*:*:*:*:*",
              "matchCriteriaId": "3B46B993-3DFE-47DB-9025-B6C58DCA18A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p199:*:*:*:*:*:*",
              "matchCriteriaId": "00787CA7-9A1D-4B62-80B6-8556A00C7527",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p200:*:*:*:*:*:*",
              "matchCriteriaId": "74ED4215-C2C7-4ADB-918D-F475EBC3DC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p201:*:*:*:*:*:*",
              "matchCriteriaId": "FC5D6725-894C-46CC-8C34-52C9C22300C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p202:*:*:*:*:*:*",
              "matchCriteriaId": "EA0DA534-D1F4-4399-B289-243E7BBBA6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p203:*:*:*:*:*:*",
              "matchCriteriaId": "0DF70DB3-5467-470A-8376-5076713B3F1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p204:*:*:*:*:*:*",
              "matchCriteriaId": "1E76CD66-A6A1-4270-85DE-894B9AE06D36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p205:*:*:*:*:*:*",
              "matchCriteriaId": "8E65023E-32AF-4BD3-965B-322D03593EF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p206:*:*:*:*:*:*",
              "matchCriteriaId": "4C319D83-A580-42DA-95BC-7F686C7A871F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p207:*:*:*:*:*:*",
              "matchCriteriaId": "73B6F787-36EE-4C67-A9D4-72E45B3A4DAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p208:*:*:*:*:*:*",
              "matchCriteriaId": "AB9A3C57-A57E-47AB-8C32-1642434A2260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p209:*:*:*:*:*:*",
              "matchCriteriaId": "67BBA775-FB30-4A6C-8D4B-A22B43A6FC37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p210:*:*:*:*:*:*",
              "matchCriteriaId": "114260EB-CEED-4C8C-A4E5-98A2934113D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p211:*:*:*:*:*:*",
              "matchCriteriaId": "D0325DED-6705-45DD-98B0-75A20EA94CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p212:*:*:*:*:*:*",
              "matchCriteriaId": "0F79E496-0F22-412B-9CD2-BADECC0BC86A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p213:*:*:*:*:*:*",
              "matchCriteriaId": "C90A4534-2057-4527-8C95-65DC36EC1B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p214:*:*:*:*:*:*",
              "matchCriteriaId": "A1EF1F52-B93B-4DF9-BDC3-89E591083B31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p215:*:*:*:*:*:*",
              "matchCriteriaId": "EEF972A9-28D6-432C-BF89-FE8B308FD73A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p216:*:*:*:*:*:*",
              "matchCriteriaId": "131ADB2D-B0DD-43E4-B92F-03C4A6B4606E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p217:*:*:*:*:*:*",
              "matchCriteriaId": "064F1862-EEF3-4937-A1BA-4DB77136D9E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p218:*:*:*:*:*:*",
              "matchCriteriaId": "B2579BDC-7511-4EB5-93EE-BC6661856DC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p219:*:*:*:*:*:*",
              "matchCriteriaId": "3303ED56-842C-4199-8C90-4C8946829861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p22:*:*:*:*:*:*",
              "matchCriteriaId": "93AEBFB8-C063-4862-ADA5-32C8AD6A215D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p220:*:*:*:*:*:*",
              "matchCriteriaId": "6ABDA987-7222-4374-9C90-7995D348A4D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p221:*:*:*:*:*:*",
              "matchCriteriaId": "A8AD850A-183B-4F0F-9306-C3DC3791220B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p222:*:*:*:*:*:*",
              "matchCriteriaId": "18234B94-97C7-4B6B-89DD-EEC23184CE47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p223:*:*:*:*:*:*",
              "matchCriteriaId": "CF6212AE-49E5-4163-ADD1-52D30C1292A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p224:*:*:*:*:*:*",
              "matchCriteriaId": "836448A1-E62B-48E7-B169-A792DA1C6BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p225:*:*:*:*:*:*",
              "matchCriteriaId": "A67A194C-F7C6-4568-A607-BD1469ECBDB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p226:*:*:*:*:*:*",
              "matchCriteriaId": "9132CD66-3BE4-45DB-8E0D-45470846736A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p227:*:*:*:*:*:*",
              "matchCriteriaId": "1F1B56D9-CAB0-4040-9AFA-5DF697FB7FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p228:*:*:*:*:*:*",
              "matchCriteriaId": "84C631CF-3B8A-45CA-BB63-1B0C0BBA7587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p229:*:*:*:*:*:*",
              "matchCriteriaId": "FBFD2AD3-141F-44EF-836E-ECBBCCA1FED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p23:*:*:*:*:*:*",
              "matchCriteriaId": "AD38DF5B-0FE3-46B0-9313-0BEDB2FB85BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p230:*:*:*:*:*:*",
              "matchCriteriaId": "69D9B2C0-7579-465F-B18B-379639E9927A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p231:*:*:*:*:*:*",
              "matchCriteriaId": "29566789-CFE1-4103-AD50-032D5D028757",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p232:*:*:*:*:*:*",
              "matchCriteriaId": "1D7ECA6E-89D8-45B5-84CE-8CB17C7A3768",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p233:*:*:*:*:*:*",
              "matchCriteriaId": "F027DACE-C9E2-4D72-9DA3-F809A64EF2F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p234:*:*:*:*:*:*",
              "matchCriteriaId": "92643045-7392-47DA-93A5-90CD0AA51E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p235:*:*:*:*:*:*",
              "matchCriteriaId": "62130999-2898-4009-B8C2-FF7F7951A604",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p236:*:*:*:*:*:*",
              "matchCriteriaId": "98FC8466-24E9-41D0-8250-44D7F8C693C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p237:*:*:*:*:*:*",
              "matchCriteriaId": "954EF915-6A9E-44E6-883E-A7A9F6284700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p238:*:*:*:*:*:*",
              "matchCriteriaId": "05E8C9DA-EA55-4DBC-A96C-0AD149557A7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p239:*:*:*:*:*:*",
              "matchCriteriaId": "1CC9AFDA-C77E-4165-BDFC-32A7B84509D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p24:*:*:*:*:*:*",
              "matchCriteriaId": "19B1C33A-80DD-4942-81A3-5A91B77B902D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p240:*:*:*:*:*:*",
              "matchCriteriaId": "C8DB8DDB-AF56-41F4-950B-A2A2E39317DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p241:*:*:*:*:*:*",
              "matchCriteriaId": "BC80B6F6-11A0-449A-897E-575F6F56F87A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p242:*:*:*:*:*:*",
              "matchCriteriaId": "13CE8993-F930-47C4-95E0-56C56353304B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p243:*:*:*:*:*:*",
              "matchCriteriaId": "9FE86C91-2490-48DF-8106-FE880E7814A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p244:*:*:*:*:*:*",
              "matchCriteriaId": "FE2353F1-6E1B-4230-A4B4-C0B797708C08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p245:*:*:*:*:*:*",
              "matchCriteriaId": "0B219D0C-E30F-4E2A-BB7A-1A31536DED5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p246:*:*:*:*:*:*",
              "matchCriteriaId": "B219601B-9514-41E0-835B-62364078C818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p247:*:*:*:*:*:*",
              "matchCriteriaId": "3F418265-D805-4252-B756-10DE5A859419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p248:*:*:*:*:*:*",
              "matchCriteriaId": "E1926405-EE10-43E3-BA5A-762FAE137257",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p249:*:*:*:*:*:*",
              "matchCriteriaId": "13DF9CF5-51DA-4CE8-804C-5242F2B15C38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p25:*:*:*:*:*:*",
              "matchCriteriaId": "FE315238-7191-4A2E-A3C6-2162BE589C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p250:*:*:*:*:*:*",
              "matchCriteriaId": "635C986B-3F82-460C-9BD7-38F8216CDD79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p251:*:*:*:*:*:*",
              "matchCriteriaId": "966C53A2-DD1A-4470-81EE-E725BC289DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p252:*:*:*:*:*:*",
              "matchCriteriaId": "03228A7D-9D07-4C4C-B9E2-48227F85CA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p253:*:*:*:*:*:*",
              "matchCriteriaId": "7BAD1823-8E3A-440D-A3C9-2597D1D5C44B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p254:*:*:*:*:*:*",
              "matchCriteriaId": "6D7A38FD-04F9-4E79-96CD-A207206EA661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p255:*:*:*:*:*:*",
              "matchCriteriaId": "23483EEB-9B8B-4A5B-8ABB-84751D7B7A39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p256:*:*:*:*:*:*",
              "matchCriteriaId": "72EBA29F-09BB-4E3C-B8C4-4F33F87ABA4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p257:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B23B7-6AE4-48F3-8D2B-D8FE47958686",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p258:*:*:*:*:*:*",
              "matchCriteriaId": "7CCA6DEC-66A1-47EF-8F58-A043FF3882CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p259:*:*:*:*:*:*",
              "matchCriteriaId": "D7A4794F-715B-4494-A98B-9D667651EC67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p26:*:*:*:*:*:*",
              "matchCriteriaId": "78648B53-1528-4815-AAEA-AEC828A1BF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p260:*:*:*:*:*:*",
              "matchCriteriaId": "DBB6B326-CD08-4E1F-9C8B-A20B9E271CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p261:*:*:*:*:*:*",
              "matchCriteriaId": "12177C82-48B7-4059-9FE3-67B6AD4394D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p262:*:*:*:*:*:*",
              "matchCriteriaId": "2BFFB250-B848-47AD-BCCC-11EE14065A37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p263:*:*:*:*:*:*",
              "matchCriteriaId": "1444370E-BF8D-4AE5-9FBB-9105E6EF78CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p264:*:*:*:*:*:*",
              "matchCriteriaId": "72D025B8-1A4D-4818-8E12-13355A21E2BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p265:*:*:*:*:*:*",
              "matchCriteriaId": "BB1A2AD1-309B-44B3-9E86-A1F68DCE9106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p266:*:*:*:*:*:*",
              "matchCriteriaId": "A2DFE9B7-5261-4786-91B3-C9E3045EA6B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p267:*:*:*:*:*:*",
              "matchCriteriaId": "28D3667D-61E3-469E-98FA-09BB84DC0DD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p268:*:*:*:*:*:*",
              "matchCriteriaId": "2DB842A1-DEBE-47B7-A071-A6551DC2E57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p269:*:*:*:*:*:*",
              "matchCriteriaId": "427D2B99-488A-4AA6-8136-A9DF944A59D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p27:*:*:*:*:*:*",
              "matchCriteriaId": "DFD3B0D3-F8B1-4B49-89AD-B7720264ABE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p270:*:*:*:*:*:*",
              "matchCriteriaId": "B47B5F96-4634-4D14-9BB3-F18B28DE9C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p271:*:*:*:*:*:*",
              "matchCriteriaId": "2C8080B1-8407-4174-B32B-E650ADEB69C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p272:*:*:*:*:*:*",
              "matchCriteriaId": "D3472CD9-C523-4DC1-9008-9454BDAC8132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p273:*:*:*:*:*:*",
              "matchCriteriaId": "9FF54974-0C40-4503-BFD3-5B44EEFD67E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p274:*:*:*:*:*:*",
              "matchCriteriaId": "C1449012-219E-48C6-A6A0-EA9EDA04FE37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p275:*:*:*:*:*:*",
              "matchCriteriaId": "A793C450-6BC8-46E7-8AB4-87BC4612B0AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p276:*:*:*:*:*:*",
              "matchCriteriaId": "E33C55DC-07AE-45A5-89A4-76A489E5A867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p277:*:*:*:*:*:*",
              "matchCriteriaId": "AE0D8BBB-F96D-48EA-8BB6-D73C36734EE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p278:*:*:*:*:*:*",
              "matchCriteriaId": "A85B2D52-AF38-47CF-9841-63DA64465418",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p279:*:*:*:*:*:*",
              "matchCriteriaId": "1B84D901-CBB1-4094-BBE7-5B26E8D39F84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p28:*:*:*:*:*:*",
              "matchCriteriaId": "E682794C-6BAD-4C62-A56B-B8FC5C246A57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p280:*:*:*:*:*:*",
              "matchCriteriaId": "44E97C82-3600-4A69-A553-BBABD7DF0C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p281:*:*:*:*:*:*",
              "matchCriteriaId": "4E804D9F-4902-445C-A4C0-B3AA9C50990E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p282:*:*:*:*:*:*",
              "matchCriteriaId": "88C5398A-5782-4DF4-A0EC-504C6B504A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p283:*:*:*:*:*:*",
              "matchCriteriaId": "D9155ABF-92D7-4A32-8B8F-D657FB7ECF09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p284:*:*:*:*:*:*",
              "matchCriteriaId": "1B286708-81FB-4A43-A641-2DD2A2AB32BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p285:*:*:*:*:*:*",
              "matchCriteriaId": "E8E97E21-5860-4A69-A41C-D6B016557EBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p286:*:*:*:*:*:*",
              "matchCriteriaId": "6B7A219D-B28B-4F30-9476-5011614EDA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p287:*:*:*:*:*:*",
              "matchCriteriaId": "93B3E6C4-FE6F-4DD6-A843-536BE332FBB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p288:*:*:*:*:*:*",
              "matchCriteriaId": "DF1882D1-8491-4DAA-B90B-66C70EE0B8C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p289:*:*:*:*:*:*",
              "matchCriteriaId": "568AE9F5-A26A-4257-BC46-57A173274C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p29:*:*:*:*:*:*",
              "matchCriteriaId": "C99673E9-9FB8-4FE8-85EE-E90402E40FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p290:*:*:*:*:*:*",
              "matchCriteriaId": "135B5E0C-09C9-4F7B-95E7-73ADD8C47332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p291:*:*:*:*:*:*",
              "matchCriteriaId": "8FDFE148-F5F8-464D-AD72-9BA98B58B784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p292:*:*:*:*:*:*",
              "matchCriteriaId": "790452BA-E1BF-4F4B-9189-55BEA1860DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p293:*:*:*:*:*:*",
              "matchCriteriaId": "80C3FEF9-99D3-4454-98F3-09B62E712B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p294:*:*:*:*:*:*",
              "matchCriteriaId": "C481B6EE-AA07-4F44-AE3E-AD5EBF94D0A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p295:*:*:*:*:*:*",
              "matchCriteriaId": "937BC376-9D57-4466-A6EC-3493AB74ABA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p296:*:*:*:*:*:*",
              "matchCriteriaId": "0B4E4FD4-6957-410A-B25B-3CB66AA6D92D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p297:*:*:*:*:*:*",
              "matchCriteriaId": "C2CB55C6-D996-459E-9AF0-CA4E5E568016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p298:*:*:*:*:*:*",
              "matchCriteriaId": "66623F9F-9BA0-449D-845E-73119AB85C7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p299:*:*:*:*:*:*",
              "matchCriteriaId": "95BC5517-41A4-42B4-A36E-598BD1BF5632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p30:*:*:*:*:*:*",
              "matchCriteriaId": "F2BB76A4-E4D3-4AAA-84E7-13F1EBF713AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p300:*:*:*:*:*:*",
              "matchCriteriaId": "DB6CB51C-FB4C-47F8-A742-4CE96241ACF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p301:*:*:*:*:*:*",
              "matchCriteriaId": "E0EDE1E5-EC6E-4042-845F-6E9C2DDA7183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p302:*:*:*:*:*:*",
              "matchCriteriaId": "086316E9-06E8-421A-A204-6313E5EE8B19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p303:*:*:*:*:*:*",
              "matchCriteriaId": "756A71A5-061F-4A31-A63B-668782164B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p304:*:*:*:*:*:*",
              "matchCriteriaId": "ACBE70BB-8F32-4964-9FB0-D3CAEC21045A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p305:*:*:*:*:*:*",
              "matchCriteriaId": "EC650C12-B1BF-4D73-A760-5E4FE5BAFDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p306:*:*:*:*:*:*",
              "matchCriteriaId": "3FF0E35E-2361-4ACD-BE48-B52E0C809B9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p307:*:*:*:*:*:*",
              "matchCriteriaId": "4B6E27C1-7523-4B43-9B8A-B085F8798D13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p308:*:*:*:*:*:*",
              "matchCriteriaId": "B7A3C1CA-101C-4E11-B7B8-EB8E52CE9A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p309:*:*:*:*:*:*",
              "matchCriteriaId": "8BF8463C-8E44-4C0D-9B1C-2FA1BD2CC190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p31:*:*:*:*:*:*",
              "matchCriteriaId": "C6631CB8-E3BC-473C-A217-E5CBBE8C8AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p310:*:*:*:*:*:*",
              "matchCriteriaId": "19EA0570-CCA5-40A6-A563-3A89072396A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p311:*:*:*:*:*:*",
              "matchCriteriaId": "82F242D7-A19B-489E-A43E-8D03524AC563",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p312:*:*:*:*:*:*",
              "matchCriteriaId": "12615298-51F2-482D-98B5-04FF3405C89F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p313:*:*:*:*:*:*",
              "matchCriteriaId": "5F27F883-CBAF-4638-9CE0-CDE1E6EEBCFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p314:*:*:*:*:*:*",
              "matchCriteriaId": "0661907B-783E-4E7A-A762-ED6AF2DC3125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p315:*:*:*:*:*:*",
              "matchCriteriaId": "E7BD9562-F3D2-4B25-8F64-8F98F8F20055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p316:*:*:*:*:*:*",
              "matchCriteriaId": "A34A0A94-1009-47AC-B697-01A18179FA83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p317:*:*:*:*:*:*",
              "matchCriteriaId": "72B6EE25-093E-4F65-9158-956FF358BC4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p318:*:*:*:*:*:*",
              "matchCriteriaId": "2C1A56B8-B7F4-4D3E-991E-55EAE6821295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p319:*:*:*:*:*:*",
              "matchCriteriaId": "2B5CA008-E02B-4FF6-9D38-5CC38D366819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p32:*:*:*:*:*:*",
              "matchCriteriaId": "3829DBDA-C15A-4F55-8B65-30FA3DD6BB34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p320:*:*:*:*:*:*",
              "matchCriteriaId": "6ACF0AA3-BC82-4FB0-B17C-F20553E96A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p321:*:*:*:*:*:*",
              "matchCriteriaId": "B4614A1D-27A2-4952-80EB-1E0096F3A9DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p322:*:*:*:*:*:*",
              "matchCriteriaId": "F2D45FAB-8F9A-4680-B91C-24A0FC5D53C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p323:*:*:*:*:*:*",
              "matchCriteriaId": "73CCF245-7374-4DE1-AE14-8520D529FB97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p324:*:*:*:*:*:*",
              "matchCriteriaId": "175AA245-3CA7-48A1-8B59-BE3EBDD50223",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p325:*:*:*:*:*:*",
              "matchCriteriaId": "E193D864-8AA3-4769-A60A-EDCF1708B868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p326:*:*:*:*:*:*",
              "matchCriteriaId": "5EBD0753-F448-47BC-B3A2-878C7CABFFD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p327:*:*:*:*:*:*",
              "matchCriteriaId": "C1DD4AF6-8E30-440B-B8E5-8D23F8C752C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p328:*:*:*:*:*:*",
              "matchCriteriaId": "A7973D03-DA1D-4470-BB44-E6D1336EA05E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p329:*:*:*:*:*:*",
              "matchCriteriaId": "C23977C3-F49A-46FF-BE70-161D4A198651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p33:*:*:*:*:*:*",
              "matchCriteriaId": "DA9F54EB-2377-4CE0-8517-564415EC79AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p330:*:*:*:*:*:*",
              "matchCriteriaId": "4A50CB94-38F4-4AC1-8D56-3C4DBDE5DA0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p331:*:*:*:*:*:*",
              "matchCriteriaId": "ADA7B8B0-FB9E-4833-BD49-4B29A6E8CE93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p332:*:*:*:*:*:*",
              "matchCriteriaId": "EB39BE69-4CC6-4142-ADAB-CAE31C60F02B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p333:*:*:*:*:*:*",
              "matchCriteriaId": "0B71E349-4644-46C4-B94B-49EA7D61ADFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p334:*:*:*:*:*:*",
              "matchCriteriaId": "AFA3FB6E-CEB5-43D5-B741-661BAE199EF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p335:*:*:*:*:*:*",
              "matchCriteriaId": "92E625E3-3E09-4EEA-8808-C60B2C5D99B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p336:*:*:*:*:*:*",
              "matchCriteriaId": "31F5F683-26B8-4582-948A-2AFC5FB4EBDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p337:*:*:*:*:*:*",
              "matchCriteriaId": "6F7A8648-0E43-47D9-872E-4B24BE68E2B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p338:*:*:*:*:*:*",
              "matchCriteriaId": "3B19F768-A654-4A11-924D-0D741A5B5063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p339:*:*:*:*:*:*",
              "matchCriteriaId": "F4DD99A1-AF44-4177-A94E-1663CCFFDBE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p34:*:*:*:*:*:*",
              "matchCriteriaId": "76B59A05-EF56-4A06-8EF2-49BABA11EFCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p340:*:*:*:*:*:*",
              "matchCriteriaId": "1A8E03B1-0A87-43EB-A9E0-A4F396948EC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p341:*:*:*:*:*:*",
              "matchCriteriaId": "6812A7B2-8267-45DA-8E9A-E9987D07ED6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p342:*:*:*:*:*:*",
              "matchCriteriaId": "13FFE741-5489-4427-9E30-4B499BE419BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p343:*:*:*:*:*:*",
              "matchCriteriaId": "2D720BAC-CF8C-4394-B7B3-E410467D02CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p344:*:*:*:*:*:*",
              "matchCriteriaId": "17CD0194-9899-4FC0-AC48-305C98180D96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p345:*:*:*:*:*:*",
              "matchCriteriaId": "250A861E-93BE-419A-84D7-EB3CBC5F37FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p346:*:*:*:*:*:*",
              "matchCriteriaId": "7BB3A976-A7E3-4C59-9BBE-DE1B815F7871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p347:*:*:*:*:*:*",
              "matchCriteriaId": "212DADA8-A0B7-499C-A6B0-8696AB1B103F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p348:*:*:*:*:*:*",
              "matchCriteriaId": "DAF064E3-4A50-40E3-A183-42D062E27FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p349:*:*:*:*:*:*",
              "matchCriteriaId": "93400158-D5E2-4B49-8F28-BB4398217F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p35:*:*:*:*:*:*",
              "matchCriteriaId": "79747394-C70B-45AE-9533-CE095E44952E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p350:*:*:*:*:*:*",
              "matchCriteriaId": "17DDD2ED-9510-487F-B598-27BFADE10D18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p351:*:*:*:*:*:*",
              "matchCriteriaId": "F90A32B0-B237-42AE-9FAE-5AF125877DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p352:*:*:*:*:*:*",
              "matchCriteriaId": "945E5002-84D6-44A0-8327-CD01A746F842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p353:*:*:*:*:*:*",
              "matchCriteriaId": "892FD4C7-17EE-4845-BCFA-1564081CD289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p354:*:*:*:*:*:*",
              "matchCriteriaId": "68DA4791-4619-4977-9B2C-489142D0055B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p355:*:*:*:*:*:*",
              "matchCriteriaId": "911A3C69-8D28-4D27-8EC7-ED02FE74BFE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p356:*:*:*:*:*:*",
              "matchCriteriaId": "BB125173-0F9C-4B57-BEC0-490C01EE2C89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p357:*:*:*:*:*:*",
              "matchCriteriaId": "09D58DE3-C8C4-4C14-B38E-84D1AC874E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p358:*:*:*:*:*:*",
              "matchCriteriaId": "AF9DDED5-9383-4014-8674-CD5A6D7E246A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p359:*:*:*:*:*:*",
              "matchCriteriaId": "BB4AABDA-3A4E-411F-A3F0-22FC06157D7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p36:*:*:*:*:*:*",
              "matchCriteriaId": "FE9E7970-8A2A-4B9A-BD8C-0B7345DDDC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p360:*:*:*:*:*:*",
              "matchCriteriaId": "9B5B447C-066F-47FF-A033-7B98638E6506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p361:*:*:*:*:*:*",
              "matchCriteriaId": "3A2FADF1-EA35-44B1-B200-3535F0899622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p362:*:*:*:*:*:*",
              "matchCriteriaId": "EA45115B-7FF5-4479-841D-DAA05EF525E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p363:*:*:*:*:*:*",
              "matchCriteriaId": "9FEC288C-ACB1-4782-AD3D-C13CD4822C9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p364:*:*:*:*:*:*",
              "matchCriteriaId": "B3948830-399B-4457-9C79-FE542885396D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p365:*:*:*:*:*:*",
              "matchCriteriaId": "297B4B83-3B41-4D05-951E-55671DFA3401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p366:*:*:*:*:*:*",
              "matchCriteriaId": "97722AA3-54FF-43DC-A926-AFB00A216D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p367:*:*:*:*:*:*",
              "matchCriteriaId": "F7059D68-D871-4C92-8DC3-C37C3660831F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p368:*:*:*:*:*:*",
              "matchCriteriaId": "4CA21B77-EE77-48B2-88A9-FDF818B83425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p369:*:*:*:*:*:*",
              "matchCriteriaId": "669E93E5-70BD-405F-A92C-6623F7A53F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p37:*:*:*:*:*:*",
              "matchCriteriaId": "B4B06D02-D9F6-4C09-BEE0-A5491B97A24C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p370:*:*:*:*:*:*",
              "matchCriteriaId": "53A468F9-6C1E-4A2E-AFDA-979E570D6DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p371:*:*:*:*:*:*",
              "matchCriteriaId": "7C064AC9-11CC-458C-9AE1-B4F870AD468C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p372:*:*:*:*:*:*",
              "matchCriteriaId": "81F985B3-B0F9-4A41-B014-4222786C960C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p373:*:*:*:*:*:*",
              "matchCriteriaId": "E3A86AF0-6A98-474C-BB6E-2C3FB6ABCCE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p374:*:*:*:*:*:*",
              "matchCriteriaId": "42F94BA2-09E5-4373-8940-B723E1D12B95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p375:*:*:*:*:*:*",
              "matchCriteriaId": "88956750-A888-4E68-B7A5-59C7259E5BAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p376:*:*:*:*:*:*",
              "matchCriteriaId": "9E738CE1-1E0C-4822-AC3A-917FA4FFA612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p377:*:*:*:*:*:*",
              "matchCriteriaId": "767426BE-5BBF-426E-A0C6-2D367B954F27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p378:*:*:*:*:*:*",
              "matchCriteriaId": "A84376E3-A31F-4EEB-8F87-A9C965C2F1DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p379:*:*:*:*:*:*",
              "matchCriteriaId": "EB98463C-35D4-4252-945B-4C50A385CE5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p38:*:*:*:*:*:*",
              "matchCriteriaId": "0C337ACA-81A0-4017-8CEB-7CB790172C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p380:*:*:*:*:*:*",
              "matchCriteriaId": "50D0EB63-C1BF-403F-A0F4-EBADBBBE9345",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p381:*:*:*:*:*:*",
              "matchCriteriaId": "D7C31F2F-163E-4384-B87E-AFE1C8C7865F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p382:*:*:*:*:*:*",
              "matchCriteriaId": "220DE1DB-5F19-4C4C-A8E3-5650870BD1ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p383:*:*:*:*:*:*",
              "matchCriteriaId": "323572A7-67C5-42AD-9E65-E54719B701DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p384:*:*:*:*:*:*",
              "matchCriteriaId": "DF6BE9BC-4C72-4D8C-96C7-8867580BD557",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p385:*:*:*:*:*:*",
              "matchCriteriaId": "D1C34D5F-DE47-4CB8-B1F7-2796D48EDF26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p386:*:*:*:*:*:*",
              "matchCriteriaId": "C54C231A-25A6-480B-87A4-6F3E9AC242EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p387:*:*:*:*:*:*",
              "matchCriteriaId": "0EE812DF-8E96-4FF8-8D03-10B98A3C4563",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p388:*:*:*:*:*:*",
              "matchCriteriaId": "CC809B83-705E-438D-B9C7-8AED384E55E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p389:*:*:*:*:*:*",
              "matchCriteriaId": "E82497A8-05F6-4AA5-9A98-C084BF6C87A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p39:*:*:*:*:*:*",
              "matchCriteriaId": "80D57A00-D9A5-4C70-B523-0064C56AD7D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p390:*:*:*:*:*:*",
              "matchCriteriaId": "2B65C876-191E-43DD-8C00-B3FFB643798C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p391:*:*:*:*:*:*",
              "matchCriteriaId": "1C55D80B-4597-4C13-8BDA-659F19CA17AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p392:*:*:*:*:*:*",
              "matchCriteriaId": "CD2417D5-0B48-41AC-B529-B6B958FD1529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p393:*:*:*:*:*:*",
              "matchCriteriaId": "E86B9970-181A-4227-85C5-6EA9DC83EC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p394:*:*:*:*:*:*",
              "matchCriteriaId": "C9AB4545-315D-430A-AEF5-FA51C91A81C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p395:*:*:*:*:*:*",
              "matchCriteriaId": "A48EA953-A9AC-4B0E-80D7-97E813AA6116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p396:*:*:*:*:*:*",
              "matchCriteriaId": "21FA80EF-86AD-4B10-847F-BE1A21DA90DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p397:*:*:*:*:*:*",
              "matchCriteriaId": "064A35E0-362D-4EAB-9659-B66A51B8A57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p398:*:*:*:*:*:*",
              "matchCriteriaId": "FC33854D-77D0-403A-9DD6-0AE57DDF1D06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p399:*:*:*:*:*:*",
              "matchCriteriaId": "0E8128A3-F0A9-443A-9B39-9DDEBD6C9E3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p4:*:*:*:*:*:*",
              "matchCriteriaId": "E0040B79-5D07-4BEA-8861-8D827FB31735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p40:*:*:*:*:*:*",
              "matchCriteriaId": "658F5E60-CA2F-4B96-B48A-715CCF553F96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p400:*:*:*:*:*:*",
              "matchCriteriaId": "263B51E4-1659-427B-A79B-D4E9DF28A57F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p401:*:*:*:*:*:*",
              "matchCriteriaId": "8B97CE98-A1EE-4ED6-A108-4BF40EA3F81D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p402:*:*:*:*:*:*",
              "matchCriteriaId": "8C818138-F20A-4F39-A5C0-6D2937EE77F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p403:*:*:*:*:*:*",
              "matchCriteriaId": "BE12A159-F94F-4410-AF88-8966101C1212",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p404:*:*:*:*:*:*",
              "matchCriteriaId": "ECC145C1-F5F5-4EE7-96FE-6F5949E483A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p405:*:*:*:*:*:*",
              "matchCriteriaId": "7F57CF8E-FE13-4E21-8F35-25068C3F36B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p406:*:*:*:*:*:*",
              "matchCriteriaId": "D75F5F25-9D47-4FA5-95DF-47CDCB3E9C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p407:*:*:*:*:*:*",
              "matchCriteriaId": "9EE75158-53F3-46F3-8028-860CD0F0493D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p408:*:*:*:*:*:*",
              "matchCriteriaId": "DA633D5D-F25E-41D0-A881-ED59EFE1593D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p409:*:*:*:*:*:*",
              "matchCriteriaId": "4166C7AD-F945-4AA0-A4FB-055D5F90A84C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p41:*:*:*:*:*:*",
              "matchCriteriaId": "CCCC6A0F-7728-4AB7-ABFB-6D8B7C327319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p410:*:*:*:*:*:*",
              "matchCriteriaId": "FE0C6655-04AA-41ED-8186-C384A5D80CAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p411:*:*:*:*:*:*",
              "matchCriteriaId": "7218D1AE-D531-4688-91DF-EFF5D2690C75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p412:*:*:*:*:*:*",
              "matchCriteriaId": "BB32757C-97CB-4782-A7D0-7905C08AB72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p413:*:*:*:*:*:*",
              "matchCriteriaId": "A8091E4A-054C-4AED-BE48-783DC4D0C8D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p414:*:*:*:*:*:*",
              "matchCriteriaId": "16CD62B2-904D-4109-BBF6-4CF71CDD171D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p415:*:*:*:*:*:*",
              "matchCriteriaId": "D5B8C246-0B8C-462E-B3EB-49988C387B4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p416:*:*:*:*:*:*",
              "matchCriteriaId": "B66B920C-F32C-47C6-A456-29D075E0FDD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p417:*:*:*:*:*:*",
              "matchCriteriaId": "A424EAE0-2B4E-4B08-B1E7-DFC9FCC0B863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p418:*:*:*:*:*:*",
              "matchCriteriaId": "3601971C-CFB7-499F-8C46-5D58D6C8E252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p419:*:*:*:*:*:*",
              "matchCriteriaId": "3E44EACB-8FAC-4FCE-B83F-9B1EFC2B8A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p42:*:*:*:*:*:*",
              "matchCriteriaId": "F6FE7257-F93D-406E-B4B3-668E41C6A8ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p420:*:*:*:*:*:*",
              "matchCriteriaId": "17B12369-3740-487C-ACBB-8D09E933CEFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p421:*:*:*:*:*:*",
              "matchCriteriaId": "4E8D3E83-11C6-4169-A401-536758AC683F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p422:*:*:*:*:*:*",
              "matchCriteriaId": "88DC6549-8447-4981-9462-AF54AB224E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p423:*:*:*:*:*:*",
              "matchCriteriaId": "8B3712F6-CD70-4D27-B51B-C152C730E4B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p424:*:*:*:*:*:*",
              "matchCriteriaId": "C538EC07-E3B5-48F4-B2BE-1D183C8167FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p425:*:*:*:*:*:*",
              "matchCriteriaId": "2536D2A7-00E8-42F3-8040-C2C581BD18EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p426:*:*:*:*:*:*",
              "matchCriteriaId": "41C5A447-68F1-4C86-B324-56346B5ED4E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p427:*:*:*:*:*:*",
              "matchCriteriaId": "9A2B4489-5A50-45B0-9AC3-55226D104C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p428:*:*:*:*:*:*",
              "matchCriteriaId": "98AE334D-93C1-410A-A993-559C4ECA6EFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p429:*:*:*:*:*:*",
              "matchCriteriaId": "55C23879-14D6-44CF-B72C-077648B7850C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p43:*:*:*:*:*:*",
              "matchCriteriaId": "DDE8AE33-9A76-4921-838C-FD26BE966936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p430:*:*:*:*:*:*",
              "matchCriteriaId": "343DE53D-5471-4A71-9ECF-F4B49FE87DC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p431:*:*:*:*:*:*",
              "matchCriteriaId": "1659F07D-AC4B-4946-AA6D-CD07BEFFD260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p432:*:*:*:*:*:*",
              "matchCriteriaId": "E5E5356A-C7DE-4E77-B563-9D9411A94487",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p433:*:*:*:*:*:*",
              "matchCriteriaId": "A90B1CB8-7CD6-455D-8B83-890DFE17F168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p434:*:*:*:*:*:*",
              "matchCriteriaId": "42F60614-8A4C-48D9-9AFE-03334B5F39A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p435:*:*:*:*:*:*",
              "matchCriteriaId": "C2CEAAC3-0738-4EFA-9C6A-140B61D6FB77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p436:*:*:*:*:*:*",
              "matchCriteriaId": "06F04569-8733-4326-AAAF-E1C0FDE9A067",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p437:*:*:*:*:*:*",
              "matchCriteriaId": "DE4263C9-9885-4AD5-9331-6EA04B579DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p438:*:*:*:*:*:*",
              "matchCriteriaId": "D34C4700-3763-402B-88A1-0E0CDAB003C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p439:*:*:*:*:*:*",
              "matchCriteriaId": "5AFC88C6-C0C7-4F06-B36F-4C07F68714DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p44:*:*:*:*:*:*",
              "matchCriteriaId": "434184FF-2FB6-4577-8F85-E488EB89D642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p440:*:*:*:*:*:*",
              "matchCriteriaId": "03CD81E7-9C87-4E8C-8B38-A9C790D3740D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p441:*:*:*:*:*:*",
              "matchCriteriaId": "AA114487-9C20-4D4C-9BE0-61E83EEA881A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p442:*:*:*:*:*:*",
              "matchCriteriaId": "AD46FDA8-410D-46ED-B9DA-DBE377A52F7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p443:*:*:*:*:*:*",
              "matchCriteriaId": "2549A1EB-CF4C-4B72-BE21-4DB6C232620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p444:*:*:*:*:*:*",
              "matchCriteriaId": "C4A5B2DE-6EDB-4687-95E9-B7BDEE8A4F52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p445:*:*:*:*:*:*",
              "matchCriteriaId": "38655472-BDE7-450A-8655-D217648FB502",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p446:*:*:*:*:*:*",
              "matchCriteriaId": "9A9EB39C-40E4-4B2F-AC0F-9AB12ABFE9E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p447:*:*:*:*:*:*",
              "matchCriteriaId": "1EEA66A5-F0EE-407D-A40E-4AF5E1AA052D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p448:*:*:*:*:*:*",
              "matchCriteriaId": "F659FB12-BED8-4DA3-886C-E49FECD2E84D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p449:*:*:*:*:*:*",
              "matchCriteriaId": "B4D83B72-6A3A-49A2-BC10-AF588CC4F8CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p45:*:*:*:*:*:*",
              "matchCriteriaId": "3DBDA6E7-5849-4551-A4E4-4C846074B55D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p450:*:*:*:*:*:*",
              "matchCriteriaId": "E6B6B540-1E6C-4031-87D8-159B683E42E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p451:*:*:*:*:*:*",
              "matchCriteriaId": "8AE3CDE6-4061-446C-8CA9-1F86CF5D0CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p452:*:*:*:*:*:*",
              "matchCriteriaId": "3524F3C9-1FB9-478B-927B-FCDAD58F9A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p453:*:*:*:*:*:*",
              "matchCriteriaId": "1E539437-A77D-4672-B7F7-401435A5DF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p454:*:*:*:*:*:*",
              "matchCriteriaId": "73EAA52B-5E57-4633-A651-2763433A581E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p455:*:*:*:*:*:*",
              "matchCriteriaId": "84791D19-F4E2-430A-891B-562C8A42F572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p456:*:*:*:*:*:*",
              "matchCriteriaId": "56CBFA28-AD97-436D-87E6-A958C80F463D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p457:*:*:*:*:*:*",
              "matchCriteriaId": "5E82DEF1-83E4-47B1-8A71-AAB6723B092E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p458:*:*:*:*:*:*",
              "matchCriteriaId": "73BDEBD9-C4A3-44AA-9067-6EAA0FB68D2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p459:*:*:*:*:*:*",
              "matchCriteriaId": "99E12DE4-36F7-47E3-B296-B7DD4908C191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p46:*:*:*:*:*:*",
              "matchCriteriaId": "9520436F-C8D9-40F0-BBE5-2B15D286B8D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p460:*:*:*:*:*:*",
              "matchCriteriaId": "B8213C7C-A1C6-491C-88DF-46799E1149FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p461:*:*:*:*:*:*",
              "matchCriteriaId": "E4A6EEC8-A256-4A29-88B9-EBD29F0E9984",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p462:*:*:*:*:*:*",
              "matchCriteriaId": "C480C64A-1591-45A0-9F8E-4ADF90ECEC4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p463:*:*:*:*:*:*",
              "matchCriteriaId": "C1F1E185-3A8B-4523-9C4D-35B219DAAB10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p464:*:*:*:*:*:*",
              "matchCriteriaId": "58DAACF5-282F-4D4F-BA58-1DCDB31B0E29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p465:*:*:*:*:*:*",
              "matchCriteriaId": "7CC89215-1461-42F4-8F0A-0E60AD86CE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p466:*:*:*:*:*:*",
              "matchCriteriaId": "D477F5D9-B8C2-498B-B979-5524BA64F082",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p467:*:*:*:*:*:*",
              "matchCriteriaId": "F7983F2C-182E-415E-B770-288BB165A660",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p468:*:*:*:*:*:*",
              "matchCriteriaId": "7A3795B8-817E-40E5-B348-74A15FF713C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p469:*:*:*:*:*:*",
              "matchCriteriaId": "87CE91F2-1FB0-41E0-89E6-58EEFA6BE41D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p47:*:*:*:*:*:*",
              "matchCriteriaId": "9BD6AC08-3F51-4410-8ECB-99B44A72568E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p470:*:*:*:*:*:*",
              "matchCriteriaId": "690FC7C1-4B39-49C6-9603-007A3E88DA66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p471:*:*:*:*:*:*",
              "matchCriteriaId": "3918A234-477D-4C0D-9E6D-CFDFA582B402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p472:*:*:*:*:*:*",
              "matchCriteriaId": "EBC0DCF1-EE12-4D07-A643-ABF51E0D1C21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p473:*:*:*:*:*:*",
              "matchCriteriaId": "B7900782-B462-4A44-96CE-A3A014E93709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p474:*:*:*:*:*:*",
              "matchCriteriaId": "3AF076BA-2834-448B-AA81-1BA5C99DA860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p475:*:*:*:*:*:*",
              "matchCriteriaId": "2917A9B3-37EC-4F51-A4D6-68270E0BFBA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p476:*:*:*:*:*:*",
              "matchCriteriaId": "F9A85B79-DACE-48DB-A575-2F14FAACFF5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p477:*:*:*:*:*:*",
              "matchCriteriaId": "F2BC6626-9073-4E98-8D81-EB68F3FF1DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p478:*:*:*:*:*:*",
              "matchCriteriaId": "E625449B-FAAC-4053-B775-8745CAF4DDB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p479:*:*:*:*:*:*",
              "matchCriteriaId": "6BC60030-61E0-41E7-B11A-B9A4AE3F15FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p48:*:*:*:*:*:*",
              "matchCriteriaId": "6AF437C6-62A2-4B99-9A24-F721A60D7D2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p480:*:*:*:*:*:*",
              "matchCriteriaId": "00A93F72-960F-4616-9E13-C7D070AA9284",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p481:*:*:*:*:*:*",
              "matchCriteriaId": "4BB13DEF-50F9-44F4-B727-FD9121A5D94A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p482:*:*:*:*:*:*",
              "matchCriteriaId": "A4CEFBF7-F69A-431B-BF71-DAB5958888F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p483:*:*:*:*:*:*",
              "matchCriteriaId": "24903C79-D6BE-4961-B787-1C3B9E88C81B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p484_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "89313369-5D95-45B2-A0F7-E105608D133D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p485_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "160577D9-BC9A-40E9-BECB-7EFA9E1A4D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p486_rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0FCFFCCD-13F9-43F2-861D-839B7046A1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p49:*:*:*:*:*:*",
              "matchCriteriaId": "0E730137-E93D-4AFB-B1E5-9CE89AF0CE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p5:*:*:*:*:*:*",
              "matchCriteriaId": "D00C1A08-1AFF-4AED-9F32-6F7400E24427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p50:*:*:*:*:*:*",
              "matchCriteriaId": "16871277-E425-4A35-A6DC-C89EBA7E74E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p51:*:*:*:*:*:*",
              "matchCriteriaId": "EDE0405D-F8DE-458D-8D75-FE582D1DC137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p52:*:*:*:*:*:*",
              "matchCriteriaId": "637D12F8-33EB-4D35-A56F-8B6A124B2936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p53:*:*:*:*:*:*",
              "matchCriteriaId": "F0C13374-0966-4372-951D-853D5CC81E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p54:*:*:*:*:*:*",
              "matchCriteriaId": "41B72391-9B36-4196-9BF0-E3C44B5A6C8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p55:*:*:*:*:*:*",
              "matchCriteriaId": "AFA07E87-043E-456C-B435-6B7EF3CAA58A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p56:*:*:*:*:*:*",
              "matchCriteriaId": "165E10ED-42CE-4313-B630-D2051DA29F1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p57:*:*:*:*:*:*",
              "matchCriteriaId": "2EDCA346-8FA5-4781-B69E-37F76DD07039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p58:*:*:*:*:*:*",
              "matchCriteriaId": "9FD3A0D8-D947-40AA-A548-CD48BB3837AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p59:*:*:*:*:*:*",
              "matchCriteriaId": "7B97D60B-CCAE-4F13-9573-23D65280C0B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p6:*:*:*:*:*:*",
              "matchCriteriaId": "6478C98A-FC07-457D-996D-53B9361B52D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p60:*:*:*:*:*:*",
              "matchCriteriaId": "D379EAE2-0D54-4FDE-A241-6E4B03692315",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p61:*:*:*:*:*:*",
              "matchCriteriaId": "91F16EF5-4F62-4D04-AF2E-9867CC96F42F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p62:*:*:*:*:*:*",
              "matchCriteriaId": "5E1AA127-8578-4DDE-9189-437FF384F24A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p63:*:*:*:*:*:*",
              "matchCriteriaId": "3F084101-EC75-4F1A-B0D3-D4B161A4C30A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p64:*:*:*:*:*:*",
              "matchCriteriaId": "B9BE6456-9805-4FC6-B937-7505480E5BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p65:*:*:*:*:*:*",
              "matchCriteriaId": "28FF7D7B-79D5-4CFA-BED1-9F68200BDBD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p66:*:*:*:*:*:*",
              "matchCriteriaId": "BBD63622-9C07-4110-BFB6-45574CA51E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p67:*:*:*:*:*:*",
              "matchCriteriaId": "326AF319-30FA-4460-8095-9895F7778808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p68:*:*:*:*:*:*",
              "matchCriteriaId": "C4F42335-E1C1-4A35-8F05-B04F73EA36AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p69:*:*:*:*:*:*",
              "matchCriteriaId": "C0A3A492-9985-4FE8-82ED-5B793F0CD252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p7:*:*:*:*:*:*",
              "matchCriteriaId": "C1D01BD4-27BF-49BD-9305-F26E0EC778AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p70:*:*:*:*:*:*",
              "matchCriteriaId": "3EB30D8D-4AE8-4975-BFAC-7A4352666335",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p71:*:*:*:*:*:*",
              "matchCriteriaId": "A29E2D36-7374-4F80-90C5-6E5B4A03DB42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p72:*:*:*:*:*:*",
              "matchCriteriaId": "BD4EF13C-9561-4791-AF4A-790466A38A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p73:*:*:*:*:*:*",
              "matchCriteriaId": "06DF6604-2175-4341-BEED-BF381A3E82FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p74:*:*:*:*:*:*",
              "matchCriteriaId": "046E1F04-A028-41C1-ACA5-0A4E13B57CEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p75:*:*:*:*:*:*",
              "matchCriteriaId": "FC712CBC-5212-4EDB-8F2E-25D839C417B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p76:*:*:*:*:*:*",
              "matchCriteriaId": "71D343FF-390C-4EA4-863D-A684D49AA321",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p77:*:*:*:*:*:*",
              "matchCriteriaId": "A75FD97F-B998-4506-8D81-87A9A4DD7216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p78:*:*:*:*:*:*",
              "matchCriteriaId": "EB24361D-B7F2-4A98-9AF7-ADB5E91FEBBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p79:*:*:*:*:*:*",
              "matchCriteriaId": "825CC1F4-A5F3-4F2F-BA82-AE5843AFA0D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p8:*:*:*:*:*:*",
              "matchCriteriaId": "F4E82220-4E07-41B0-952A-9C0CC0973D60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p80:*:*:*:*:*:*",
              "matchCriteriaId": "6969C6F6-845C-4023-B7D3-2E0ECE90D355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p81:*:*:*:*:*:*",
              "matchCriteriaId": "6EB84D6B-FC5A-4AC3-9F2D-EA3015917FCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p82:*:*:*:*:*:*",
              "matchCriteriaId": "3B0487A0-CA40-4DA6-9CE2-B912180FCDC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p83:*:*:*:*:*:*",
              "matchCriteriaId": "904B93E2-D880-49A7-B6EB-E4CC0274CE49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p84:*:*:*:*:*:*",
              "matchCriteriaId": "FE6E7BAC-0D0E-4BE7-A3EB-5DC39FFD3BD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p85:*:*:*:*:*:*",
              "matchCriteriaId": "6D66BC48-C3BA-4BEA-BE22-15E08400F7EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p86:*:*:*:*:*:*",
              "matchCriteriaId": "1A33C1B1-72FA-4B7A-BFB1-74A8C8B9E0AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p87:*:*:*:*:*:*",
              "matchCriteriaId": "671D4E8C-27EB-404B-8360-4DDB17794C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p88:*:*:*:*:*:*",
              "matchCriteriaId": "19CE5AEB-1A3E-4E4E-9582-90FFF796F750",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p89:*:*:*:*:*:*",
              "matchCriteriaId": "9673E80A-55D3-4D2C-B8E0-2EE46950DB8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p9:*:*:*:*:*:*",
              "matchCriteriaId": "38F02F01-569A-445D-A954-D9369E0B8850",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p90:*:*:*:*:*:*",
              "matchCriteriaId": "97E2530E-CD9B-4DE1-ABCE-4777F54D8DF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p91:*:*:*:*:*:*",
              "matchCriteriaId": "6470A9D0-4C38-4A3D-90EE-3B1D9DB6E25A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p92:*:*:*:*:*:*",
              "matchCriteriaId": "CB5503D1-4DF1-402A-83BA-46EF69CE88F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p93:*:*:*:*:*:*",
              "matchCriteriaId": "DE5410A0-A66E-4759-9D7A-268374747936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p94:*:*:*:*:*:*",
              "matchCriteriaId": "B44716FB-1789-45E7-A2E1-06489D29DDFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p95:*:*:*:*:*:*",
              "matchCriteriaId": "E00F67B6-7B05-4EAE-8004-080590CC6381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p96:*:*:*:*:*:*",
              "matchCriteriaId": "8BF82B7F-A4B8-4294-BF92-7B09EE1A61F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p97:*:*:*:*:*:*",
              "matchCriteriaId": "8F8E44FE-91B3-44B6-B793-65176C01294F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p98:*:*:*:*:*:*",
              "matchCriteriaId": "4F81E473-FDFA-49B1-B2F9-DE44BFC4333E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.7:p99:*:*:*:*:*:*",
              "matchCriteriaId": "8E4ED509-8B0B-4F3E-9378-193500762248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
              "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
              "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
              "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
              "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
              "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
              "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
              "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*",
              "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*",
              "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C771C48E-2B29-491D-8FF0-69D81229465D",
              "versionEndExcluding": "c.4.2.8.2.0",
              "versionStartIncluding": "b.11.31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n read_mru_list en NTP en versiones anteriores a 4.2.8p9 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una consulta mrulist manipulada."
    }
  ],
  "id": "CVE-2016-7434",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-13T16:59:00.557",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://nwtime.org/ntp428p9_release/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3082"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94448"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037354"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa139"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/40806/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/633847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://nwtime.org/ntp428p9_release/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94448"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037354"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03706en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/40806/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/633847"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-06 20:29
Modified
2025-01-14 19:29
Summary
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
References
cve@mitre.orghttp://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://support.ntp.org/bin/view/Main/NtpBug3454Mitigation, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/541824/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/103339Third Party Advisory, VDB Entry
cve@mitre.orghttps://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.ascThird Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201805-12Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20180626-0001/Third Party Advisory
cve@mitre.orghttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/3707-1/Third Party Advisory
cve@mitre.orghttps://usn.ubuntu.com/3707-2/Third Party Advisory
cve@mitre.orghttps://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlThird Party Advisory
cve@mitre.orghttps://www.synology.com/support/security/Synology_SA_18_13Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/NtpBug3454Mitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/541824/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/103339Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201805-12Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20180626-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3707-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3707-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/support/security/Synology_SA_18_13Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9B114E-15BF-4731-9296-A8F82591B418",
              "versionEndExcluding": "4.2.8",
              "versionStartIncluding": "4.2.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
              "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
              "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
              "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*",
              "matchCriteriaId": "0BC62D4E-D519-458C-BE4E-10DDB73A97D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
              "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
              "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
              "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
              "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*",
              "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*",
              "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*",
              "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B0AEDA-4FC3-4AD8-ADE3-356A4498AF95",
              "versionEndExcluding": "1.1.6-6931-3",
              "versionStartIncluding": "1.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:skynas:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C114627A-7D1E-4B0C-B004-9CFAC78F2F0F",
              "versionEndExcluding": "6.1.5-15254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:virtual_diskstation_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65C1F9D-C457-49E8-A46B-9B15D5FCE5C7",
              "versionEndExcluding": "6.1.6-15266",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B270650E-B819-4CE6-B129-BF90CE8B2A03",
              "versionEndExcluding": "6.1.6-15266",
              "versionStartIncluding": "5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A606357-7469-43AD-8B5A-152C43D017DF",
              "versionEndExcluding": "2.2.3-1505",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB",
              "versionEndExcluding": "c.4.2.8.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C32584F2-910F-40D2-B6EE-EA4D23E10093",
              "versionEndExcluding": "xcp2361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F63BFBA-A4D8-43D1-A13E-DEED6AEF596B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D512DA28-0734-43F5-A2F8-0828AE02AC9A",
              "versionEndExcluding": "xcp2361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BB5347-D09D-4FC5-9F1C-7F3E036C18AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5262B15-F2CC-4E49-A5C3-DA8AC77EE93F",
              "versionEndExcluding": "xcp2361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "529D4274-F33B-47C7-A3FB-6F86096FD955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7AD36E-DC2F-400B-A3CC-8E3410C65316",
              "versionEndExcluding": "xcp2361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A534E662-66B7-448B-A763-6B043112C877",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3179F5BF-7A7E-4C2C-A8A0-D8918C8FF809",
              "versionEndExcluding": "xcp2361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95541D18-5C33-49E9-924D-0B21162EC2C4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA98A6E-9490-4824-9ED3-3D72F63E8D43",
              "versionEndExcluding": "xcp2361",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22FD4F61-0A4F-4C74-A852-B1CD3639E1D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB5D9B37-5071-407B-A717-B686786226B4",
              "versionEndExcluding": "xcp3070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F63BFBA-A4D8-43D1-A13E-DEED6AEF596B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "562A7D6E-B216-4182-A5FB-4AFE811CE601",
              "versionEndExcluding": "xcp3070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BB5347-D09D-4FC5-9F1C-7F3E036C18AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FE144E5-A9AA-4688-880A-5001AB418010",
              "versionEndExcluding": "xcp3070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "529D4274-F33B-47C7-A3FB-6F86096FD955",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56DEDA3-5B9D-4FF3-B681-7F052AE9891D",
              "versionEndExcluding": "xcp3070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A534E662-66B7-448B-A763-6B043112C877",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B775A394-D1BB-4558-8DFC-8B99195EEF6D",
              "versionEndExcluding": "xcp3070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95541D18-5C33-49E9-924D-0B21162EC2C4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A49B2E-A679-4D8F-A027-570A7DE83134",
              "versionEndExcluding": "xcp3070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22FD4F61-0A4F-4C74-A852-B1CD3639E1D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the \"other side\" of an interleaved association causing the victim ntpd to reset its association."
    },
    {
      "lang": "es",
      "value": "El motor de protocolo en ntp, en versiones 4.2.6 anteriores a la 4.2.8p11, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (interrupci\u00f3n) mediante el env\u00edo continuado de un paquete con una marca de tiempo zero-origin y la direcci\u00f3n IP de origen \"del otro lado\" de una asociaci\u00f3n intercalada que provoca que el ntpd de la v\u00edctima restablezca su asociaci\u00f3n."
    }
  ],
  "id": "CVE-2018-7185",
  "lastModified": "2025-01-14T19:29:55.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-06T20:29:01.500",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3454"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103339"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3707-1/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3707-2/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_18_13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/541824/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103339"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180626-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3707-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3707-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_18_13"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-27 17:59
Modified
2025-04-20 01:37
Summary
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
References
cve@mitre.orghttp://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
cve@mitre.orghttp://seclists.org/fulldisclosure/2017/Nov/7
cve@mitre.orghttp://seclists.org/fulldisclosure/2017/Sep/62
cve@mitre.orghttp://support.ntp.org/bin/view/Main/NtpBug3379Patch, Vendor Advisory
cve@mitre.orghttp://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_SecuVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/97051Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1038123Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-3349-1
cve@mitre.orghttps://bto.bluecoat.com/security-advisory/sa147
cve@mitre.orghttps://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdfThird Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/
cve@mitre.orghttps://support.apple.com/HT208144Third Party Advisory
cve@mitre.orghttps://support.apple.com/kb/HT208144
cve@mitre.orghttps://support.f5.com/csp/article/K99254031
cve@mitre.orghttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
cve@mitre.orghttps://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
cve@mitre.orghttps://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2017/Nov/7
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2017/Sep/62
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/NtpBug3379Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_SecuVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/97051Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038123Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3349-1
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa147
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT208144Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/kb/HT208144
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K99254031
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
af854a3a-2127-422b-91ae-364da2661108https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
Impacted products
Vendor Product Version
ntp ntp *
ntp ntp *
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
ntp ntp 4.2.8
hpe hpux-ntp *
apple mac_os_x *
siemens simatic_net_cp_443-1_opc_ua_firmware *
siemens simatic_net_cp_443-1_opc_ua -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED3C1F7-6FFA-44D1-BC56-2BB1963F3B9F",
              "versionEndExcluding": "4.2.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3505DE7A-B365-4455-A7BC-474019426C46",
              "versionEndExcluding": "4.3.94",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
              "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
              "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
              "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
              "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
              "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
              "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
              "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
              "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
              "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*",
              "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*",
              "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*",
              "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*",
              "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*",
              "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*",
              "matchCriteriaId": "EE002C76-406D-4F22-B738-E17BDEA70BCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1A1FDA7-BE46-4FAB-A3FD-9A40C770C4AB",
              "versionEndExcluding": "c.4.2.8.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "64CBADD5-9C10-4D8F-9844-B6FB82695786",
              "versionEndExcluding": "10.13",
              "versionStartIncluding": "10.8.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EFD09A-3D77-47B0-93FB-50F6C13A2F9A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F488810-73E3-4475-975A-C2FCA037E78B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en las funciones ctl_put * en NTP en versiones anteriores a 4.2.8p10 y 4.3.x en versiones anteriores a 4.3.94 permiten a usuarios remotos autenticados tener un impacto no especificado a trav\u00e9s de una variable larga."
    }
  ],
  "id": "CVE-2017-6458",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-27T17:59:00.633",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3379"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97051"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038123"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-3349-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bto.bluecoat.com/security-advisory/sa147"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT208144"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.apple.com/kb/HT208144"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.f5.com/csp/article/K99254031"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2017/Nov/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2017/Sep/62"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/NtpBug3379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-3349-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bto.bluecoat.com/security-advisory/sa147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT208144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.apple.com/kb/HT208144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K99254031"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03962en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}